CYBER SECURITY

12345678
Across
  1. 3. Pretending to be someone else to gain access or information
  2. 6. A unique numerical label assigned to each device on a network
  3. 8. The amount of time spent using digital devices
Down
  1. 1. Authentication using physical characteristics like fingerprints or face
  2. 2. A unique identifier used to log into a system
  3. 4. A copy of data kept in case the original is lost or compromised
  4. 5. An improvement or fix applied to software or systems
  5. 7. A device that forwards data between computer networks