Across
- 4. Impersonation attack on the web
- 6. System‑weakness hunt
- 7. Network barrier that screens traffic
- 9. Scrambling data for secrecy
Down
- 1. Process of identity verification
- 2. Malicious code demanding money
- 3. Fake‑site fraud to steal data
- 5. Virus‑killing program
- 8. Unintentional human error causing breach
- 10. Secret string for access
