Across
- 2. Safeguarding against unauthorized access
- 3. Network of compromised computers
- 4. Barrier against unwanted network traffic
- 6. Encoding data for secure transmission
- 8. Potential danger to system integrity
Down
- 1. Clear insight into system operations
- 2. Malicious software for covert surveillance
- 5. Interconnected system of devices and servers
- 7. Remote storage and computing infrastructure
- 9. Confirming identity for access
