Protecting Data

1234567891011
Across
  1. 3. The highest level of access allowing full control over system resources. (13/6 letters)
  2. 5. Rules or standards that define how data is transmitted over a network. (9 letters)
  3. 8. A type of backup that only saves changes made since the last backup. (11/6 letters)
  4. 9. A copy of data stored separately to be used for recovery in case of data loss. (6 letters)
  5. 10. The successor to SSL, providing enhanced security for data transmission. (3 letters)
  6. 11. A permission level where users can view but not modify files. (4/4/6 letters)
Down
  1. 1. Software that is designed to damage or disrupt a system. (7 letters)
  2. 2. Electronic documents used to authenticate the identity of users or websites. (7/12 letters)
  3. 4. A security protocol used for encrypting information over the internet. (3 letters)
  4. 6. A physical security measure using biological data, like fingerprints or iris scans, for authentication. (9/6 letters)
  5. 7. The process of converting data into a coded format to prevent unauthorized access. (10 letters)