Cybersecurity
Across
- 2. Software that monitors for malware
- 4. Scam emails that trick users
- 5. Harmful software that damages computers
- 6. Facial recognition to access phone
Down
- 1. machines learning and thinking
- 2. Access granted to perform actions
- 3. Malware locks files for money