Across
- 3. Network security barrier against unauthorized access.
- 4. Deceptive emails aiming to extract personal data.
- 7. Identity verification for authorized access.
- 9. Deceptive act of assuming someone's identity.
- 10. Unwanted bulk emails.
- 11. Data security through secret code conversion.
Down
- 1. Malicious assault on computer systems or networks.
- 2. Malicious software demanding payment for data release.
- 5. Protective software against malware and viruses.
- 6. Deceptive technique involving voice calls for extracting sensitive data.
- 8. Website or email address identifier.