Across
- 1. "Creates a private, secure tunnel for your internet connection."
- 5. A quick software update designed to fix a security vulnerability.
- 6. A spare copy of files kept in case of data loss.
- 8. "Using physical traits, like fingerprints, to verify your identity."
- 9. A digital barrier that monitors and blocks unauthorized network traffic.
Down
- 2. A long string of random words used as a secure password.
- 3. Scrambles data so only authorized users can read it.
- 4. "Disguising a communication to appear from a trusted, known source."
- 5. Fake emails used to trick people into sharing private information.
- 7. Harmful software designed to damage or gain access to a computer.
