Across
- 4. Attack involving the use of Malicious Software
- 7. Process of Verifying Identity
- 8. Secure connection Protocol
- 9. Communicating devices in a network
Down
- 1. Software that protects against malware
- 2. Method use to protect/Hide information
- 3. A method use to protect integrity of a data
- 5. A network security devices
- 6. Threat that involves fraudulent emails
