Across
- 2. Digital code used to prove identity
- 3. Using body measurements for ID
- 5. Secret string for user authentication
- 7. Person who exploits system weaknesses
- 8. Software designed to damage computers
- 10. Converting data into secret code
- 11. Malware that demands payment to unlock files
Down
- 1. Files that track website activity
- 4. Software recording user actions secretly
- 5. Fraudulent emails to steal sensitive data
- 6. Security system monitoring network traffic
- 9. Secure tunnel for internet connection
