Across
- 3. controls flow of network traffic between device and internet
- 5. when unauthorized individuals access data
- 9. giving of 2 pieces of personal information to access data
Down
- 1. detects a physical attribute of an individual allowing/denying them access to data
- 2. malware disguised as legitimate sites
- 4. converts plaintext into ciphertext and vice versa
- 6. detection software which detects malicious activity
- 7. consequence of computer misuse
- 8. data stored in an alternative location to be recovered
