Security concepts

1234567891011121314151617181920
Across
  1. 4. personal code to log into your devices
  2. 5. Secure network tunnel
  3. 6. Verifying identity
  4. 7. Dual-layer authentication
  5. 10. Holds data hostage
  6. 11. Fakes digital identity
  7. 12. Engineering Manipulates human behavior
  8. 14. Data scrambling for privacy
  9. 16. Network security barrier
  10. 18. Detects and removes malware
  11. 20. Redirects to fake sites
Down
  1. 1. Malicious digital intrusion
  2. 2. Software with malicious intent
  3. 3. Device in a network
  4. 5. Weakness in security
  5. 8. Software update for security
  6. 9. Records keystrokes
  7. 13. Authentication via body traits
  8. 15. Malicious program's function
  9. 17. Deceptive email tactic
  10. 19. Unauthorized access point