Cyber Security
Across
- 5. Secret code for account access
- 6. Protection for brand names or logos
- 9. Tricking users to steal information
- 11. Illegal copying of software
- 15. Keeping information secret
- 16. Verifying user identity
- 17. Copying work without credit
- 19. Sending unwanted bulk messages
- 20. Legal protection for original content
Down
- 1. Protects computers and data from attacks
- 2. Extra copy of data for safety
- 3. Ensures data is not altered
- 4. Information is accessible when needed
- 7. Blocks unauthorized network access
- 8. Control over personal information
- 10. Unauthorized access to systems
- 12. Moral rules for using technology
- 13. Protection for inventions
- 14. Online trail left by users
- 18. Software that removes malware