privacy and security

1234567891011
Across
  1. 2. Digital code used to prove identity
  2. 3. Using body measurements for ID
  3. 5. Secret string for user authentication
  4. 7. Person who exploits system weaknesses
  5. 8. Software designed to damage computers
  6. 10. Converting data into secret code
  7. 11. Malware that demands payment to unlock files
Down
  1. 1. Files that track website activity
  2. 4. Software recording user actions secretly
  3. 5. Fraudulent emails to steal sensitive data
  4. 6. Security system monitoring network traffic
  5. 9. Secure tunnel for internet connection