Cyber Quiz17

123456789
Across
  1. 4. Attack involving the use of malicious software
  2. 7. Process of verifying identity
  3. 8. Secure connection protocol
  4. 9. communicating device in a network is known as
Down
  1. 1. Software that protects against malware
  2. 2. Method used to protect/hide information
  3. 3. A method to confirm the integrity of data
  4. 5. A network security device
  5. 6. Threat that involves fraudulent emails