Across
- 4. Attack involving the use of malicious software
- 7. Process of verifying identity
- 8. Secure connection protocol
- 9. communicating device in a network is known as
Down
- 1. Software that protects against malware
- 2. Method used to protect/hide information
- 3. A method to confirm the integrity of data
- 5. A network security device
- 6. Threat that involves fraudulent emails
