Cyber Search

12345678910
Across
  1. 4. Impersonation attack on the web
  2. 6. System‑weakness hunt
  3. 7. Network barrier that screens traffic
  4. 9. Scrambling data for secrecy
Down
  1. 1. Process of identity verification
  2. 2. Malicious code demanding money
  3. 3. Fake‑site fraud to steal data
  4. 5. Virus‑killing program
  5. 8. Unintentional human error causing breach
  6. 10. Secret string for access