Security

12345678910
Across
  1. 4. Encrypts a device or network in order to extort
  2. 5. Software intended to infiltrate and damage or disable devices
  3. 6. Prevents unauthorised access to a device or network
  4. 7. The transformation of data to hide its information content
  5. 9. Detects and removes malicious software
  6. 10. Using body measurements to authenticate
Down
  1. 1. All the data marks you leave behind when you are online
  2. 2. Making a copy of data
  3. 3. A secret series of characters used to authenticate a person’s identity
  4. 8. A person who performs a cyber attack or causes an accident