Across
- 4. authentication using physical characteristics
- 7. people carrying out specific actions
- 8. software that installs itself secretly
- 11. highly targeted phishing attacks
- 12. virus disguised as legitimate software
- 17. protect personal data
- 18. users directed towards fake websites
- 19. updates to improve security
Down
- 1. permission to be on hard-drive
- 2. security feature to detect hacking
- 3. users denied access to services
- 5. mathematical fuction that protects information
- 6. attempting to obtain sensitive information
- 9. prevents unauthorized access
- 10. program added for entertainment
- 13. emails asking for sensitive information
- 14. detect and remove viruses
- 15. software that makes data unstable
- 16. secret software installed on hard-drive
- 20. shared storage accessed online