Across
- 2. A tool that helps block unauthorized access to networks.
- 4. Software that collects data from your device without consent.
- 9. Verifying your identity, often with passwords or biometrics.
- 10. False information spread to deceive or manipulate people.
Down
- 1. Malicious software that harms devices or steals data.
- 3. Encoding data to keep it secure from unauthorized access.
- 5. Your login details needed to access accounts.
- 6. Information that must be protected from unauthorized access.
- 7. An incident where data is accessed without permission.
- 8. A deceptive attempt to steal personal data through fake emails or SMS.
