EQUATE Cybersecurity - Email edition

1234567891011
Across
  1. 3. Network security barrier against unauthorized access.
  2. 4. Deceptive emails aiming to extract personal data.
  3. 7. Identity verification for authorized access.
  4. 9. Deceptive act of assuming someone's identity.
  5. 10. Unwanted bulk emails.
  6. 11. Data security through secret code conversion.
Down
  1. 1. Malicious assault on computer systems or networks.
  2. 2. Malicious software demanding payment for data release.
  3. 5. Protective software against malware and viruses.
  4. 6. Deceptive technique involving voice calls for extracting sensitive data.
  5. 8. Website or email address identifier.