Lesson 1.3

12345678
Across
  1. 5. they mitigate vulnerabilities
  2. 6. its top priority is make money
  3. 7. personal identity information
  4. 8. financial information
Down
  1. 1. it's a byproduct of technological change
  2. 2. bugs and …
  3. 3. arise new security issues
  4. 4. a weakness or a lack of countermeasures