Cyber Security
Across
- 4. Digital systems and the online world
- 7. Process of identifying a user's identity
- 8. Technology allows us to access files through IE
- 10. Used by hackers to obtain sensitive information
Down
- 1. Limits access to private networks
- 2. Method of protecting sensitive information
- 3. Copy of a system or the network to protect data
- 5. Software designed to detect malware infections
- 6. Causes damaged on computers
- 9. Small files stored on a computer