Digital Communications
Across
- 1. Procedures used to protect data from unauthorised access
- 4. A very obvious password
- 7. Act of spies hacking or infiltrating internet systems
- 8. Attackers impersonate legitimate entities, often through emails or fake websites
- 9. The first form of the Internet
Down
- 2. Set of 8 characters either 0's or 1's
- 3. Small bundles of data
- 5. Malicious software
- 6. Common web search engine