Across
- 4. digital illegal activity
- 5. network security barrier
- 6. scam in which attackers trick people into disclosing confidential information
Down
- 1. harmful software
- 2. isolated testing environment
- 3. unique physical characteristics for authentication
- 4. protection of digital resources