156

123456789101112
Across
  1. 2. Measures taken to protect against unauthorized access, theft, or damage.
  2. 4. Watching videos or listening to music online without downloading.
  3. 6. Harmful software that can infect and damage computer files and programs.
  4. 8. Storing data and files online to access them from any device with an internet connection.
  5. 10. Software that securely stores and manages passwords for various accounts.
  6. 11. Security system that controls and filters network traffic to protect against threats.
  7. 12. Creating a copy of data to restore in case of loss or damage.
Down
  1. 1. Biometric authentication using facial recognition.
  2. 2. Unwanted and unsolicited emails, often sent in bulk.
  3. 3. Biometric authentication using fingerprint recognition.
  4. 4. Regular payment for access to a service or content.
  5. 5. Installing the latest version of software to get new features and fixes.
  6. 7. Software intended to harm or exploit devices, data, or networks.
  7. 9. Improving a device or software to a better or newer version.
  8. 10. Protection of personal information from being accessed or shared without consent.