Across
- 2. linklayer
- 3. trusted key distribution
- 5. breakingencryption scheme
- 6. bigger risk
- 8. cryptography
- 9. someone reads your mail
- 12. someone intercepts your mail and modify
- 13. application layer
- 14. virtual private network
Down
- 1. transport control protocol
- 4. internet layer
- 7. filtering system
- 10. transport layer
- 11. send mail and sign your name
