Across
- 3. Conceals IP address
- 5. Fingerprints or facial recognition
- 7. Unwanted and unsolicited emails
- 8. Malicious software
Down
- 1. Adds an extra layer of security in authentication
- 2. Security barrier for Network access
- 4. Unique phrase for account access
- 6. Detects and responds to threats
