Cyber Quiz

123456789
Across
  1. 4. Attack involving the use of Malicious Software
  2. 7. Process of Verifying Identity
  3. 8. Secure connection Protocol
  4. 9. Communicating devices in a network
Down
  1. 1. Software that protects against malware
  2. 2. Method use to protect/Hide information
  3. 3. A method use to protect integrity of a data
  4. 5. A network security devices
  5. 6. Threat that involves fraudulent emails