Across
- 3. Weakness that can be exploited
- 5. Verifies user or system identity.
- 7. Scrambles data securely.
Down
- 1. Network security system that controls traffic.
- 2. Protects systems from attacks.
- 4. Fraudulent emails to steal information.
- 6. Malicious software that disrupts.