game

1234567891011
Across
  1. 2. Harmful software
  2. 5. Keeping data secret
  3. 6. Rules for data protection
  4. 8. Protection of personal information
  5. 9. Permission to use data or system
  6. 10. Protection of systems and data
  7. 11. Person who breaks into systems
Down
  1. 1. Verifying user identity
  2. 3. Converting data into secret code
  3. 4. Network security barrier
  4. 6. Secret word for login
  5. 7. Extra copy of data