Across
- 5. I’m a secret path that hackers try to explore, A hidden entrance bypassing the main door
- 6. Before you enter, I check if you are truly you, Passwords, codes, or faces help me verify it's true
- 8. You may log in, but wait once more, Let me check what actions you’re allowed for
- 9. I am a weakness that attackers love to see, An open door in security
- 10. I guard the gate of networks wide, Let good pass through and bad I hide
Down
- 1. I guide how messages travel from start to goal, Computers follow my rules to stay in control
- 2. Your fingerprint or face is the key I use, A unique identity no one else can choose
- 3. A small repair when software goes wrong, Fixing weak spots so systems stay strong
- 4. Silent I sit while fingers play, Recording each key you type all day
- 7. I bring improvements and fixes to your system state, Keeping your software secure and up to date
