Across
- 2. Measures taken to protect against unauthorized access, theft, or damage.
- 4. Watching videos or listening to music online without downloading.
- 6. Harmful software that can infect and damage computer files and programs.
- 8. Storing data and files online to access them from any device with an internet connection.
- 10. Software that securely stores and manages passwords for various accounts.
- 11. Security system that controls and filters network traffic to protect against threats.
- 12. Creating a copy of data to restore in case of loss or damage.
Down
- 1. Biometric authentication using facial recognition.
- 2. Unwanted and unsolicited emails, often sent in bulk.
- 3. Biometric authentication using fingerprint recognition.
- 4. Regular payment for access to a service or content.
- 5. Installing the latest version of software to get new features and fixes.
- 7. Software intended to harm or exploit devices, data, or networks.
- 9. Improving a device or software to a better or newer version.
- 10. Protection of personal information from being accessed or shared without consent.
