Across
- 5. program that secretly records information from a user’s device (7 letters).
- 7. process of confirming someone’s identity (13 letters).
- 8. data to keep it secret from unauthorized access (10 letters).
Down
- 1. type of attack that lures victims into revealing personal information (8 letters).
- 2. that demands payment to restore access to data (10 letters).
- 3. Horse^A malicious program disguised as legitimate (11 letters).
- 4. isolated testing environment for untrusted code (8 letters).
- 6. protective barrier between a network and potential threats (8 letters).
