Across
- 3. looking at private information
- 6. separates malicious software from legitimate applications
- 8. barrier on a computer
Down
- 1. data personal information
- 2. permission access granted to users to specific resources
- 4. someone who hacks your account
- 5. unprocessed information
- 7. animal and computer virus
