game
Across
- 2. Harmful software
- 5. Keeping data secret
- 6. Rules for data protection
- 8. Protection of personal information
- 9. Permission to use data or system
- 10. Protection of systems and data
- 11. Person who breaks into systems
Down
- 1. Verifying user identity
- 3. Converting data into secret code
- 4. Network security barrier
- 6. Secret word for login
- 7. Extra copy of data