Across
- 2. - Scam using fake links (e.g., "Pos Laju" fraud).
- 4. - Harmful software (e.g., viruses, ransomware).
- 5. - Security principle ensuring data confidentiality.
- 7. - Text files tracking user activity on websites.
- 8. - Guarantees timely access to avoid delays.
Down
- 1. - Security tool blocking unauthorized network access.
- 3. - Prevents unauthorized data modification.
- 6. - Malicious actor who illegally accesses computer systems.
