Biometrics Are Not Better

123456789101112
Across
  1. 4. avoided or gone around a rule, system, or security measure.
  2. 8. taking advantage of a weakness or vulnerability for personal gain or to cause harm.
  3. 10. accessed or broken into a computer system or network without permission.
  4. 11. the process of recognizing or proving who someone is, often by using documents or biometrics.
  5. 12. writing that is based on real events, people, and facts rather than imagination.
Down
  1. 1. incidents where security or trust is broken, often involving unauthorized access to information.
  2. 2. relating to the measurement of unique physical characteristics, such as fingerprints or facial recognition, used for identification.
  3. 3. a comparison showing how two different things are similar in some way to help explain an idea.
  4. 5. the author’s position or viewpoint on a topic, supported by reasons and evidence.
  5. 6. a statement or opinion that can be supported with evidence; part of an argument.
  6. 7. weaknesses that can be exploited or taken advantage of by others, often in systems or defenses.
  7. 9. protection of information, property, or people from danger, loss, or unauthorized access.