Data Security
Across
- 3. Deleting data so it cannot be recovered easily.
- 4. Physically destroying storage devices.
- 7. A secret word to log in.
- 9. Software that removes malware.
- 11. Uses fingerprints or face scans to identify users.
- 13. Data backed-up away from the main building.
Down
- 1. Used to enter a PIN.
- 2. Checking user identity.
- 5. Uses two ways to log in.
- 6. Rules about what users can access.
- 8. Blocks unsafe network traffic.
- 10. Scrambling data to keep it secret.
- 12. Uses radio waves to read data from a card.