Cyber

123456789
Across
  1. 1. Email scam tactic
  2. 3. Network protection
  3. 4. Private browsing tunnel
  4. 5. Unique authentication method
  5. 7. Data security
  6. 9. Vulnerability exploitation tactic
Down
  1. 1. Fake website redirection
  2. 2. Isolated software testing environment
  3. 6. Data encryption extortion
  4. 8. Cyber threats