Computer Security

123456789
Across
  1. 3. controls flow of network traffic between device and internet
  2. 5. when unauthorized individuals access data
  3. 9. giving of 2 pieces of personal information to access data
Down
  1. 1. detects a physical attribute of an individual allowing/denying them access to data
  2. 2. malware disguised as legitimate sites
  3. 4. converts plaintext into ciphertext and vice versa
  4. 6. detection software which detects malicious activity
  5. 7. consequence of computer misuse
  6. 8. data stored in an alternative location to be recovered