CYBERSECURITY

123456789
Across
  1. 2. Online storage.
  2. 3. Decryption necessity.
  3. 4. Securely lock files.
  4. 5. Harmful software.
  5. 8. Fake software tactic.
Down
  1. 1. Ransomware type.
  2. 2. Encrypting malware.
  3. 6. Ensuring privacy.
  4. 7. Data preservation.
  5. 9. Remote access method.