Across
- 3. Protocol for secure email
- 7. Method to authenticate users
- 10. Scrambles data for privacy
- 11. Protects systems from malware
- 13. Scanning for vulnerabilities
- 15. Prevents unwanted emails
- 18. Remote monitoring of devices
- 19. Standard for network encryption
Down
- 1. Attack on website servers
- 2. Secure file sharing protocol
- 4. Fake website for phishing
- 5. Unauthorized access to data
- 6. Denial of Service attack
- 8. Security for wireless networks
- 9. A breach of security
- 12. Malicious software program
- 14. Unauthorized user access point
- 16. Attack on network resources
- 17. Software to block threats
