Across
- 2. Cyber criminals.
- 5. Today's hero.
- 8. Stops unauthorized access.
- 9. Act of notifying suspicious activity.
- 10. Group of interconnected computers.
Down
- 1. Primary phishing tool.
- 3. Program that runs on a computer.
- 4. Deceptive email tactic.
- 6. Measures to protect data.
- 7. Notification of potential threat.
