Across
- 2. Malicious software to damage systems.
- 3. The global system that connects computers worldwide
- 4. A measure used to ensure the privacy and security of information.
- 6. Cyber attack gaining unauthorized access.
- 7. method of converting data to prevent access.
Down
- 1. Technique for verifying user identity.
- 5. unauthorized copying or use of software or data
