CYBER SECURITY CHALLENGE
Across
- 1. Computer threat
- 4. Secure data
- 6. Programmer's language
- 7. Network shield
- 9. Data protection
- 10. Internet platform
- 12. Login requirement
- 14. Computer connection
Down
- 2. Protected data
- 3. Virus remover
- 5. Security symbol
- 8. Harmful software
- 11. Unauthorized access
- 13. Computer information