Across
- 4. Secret code used to access a device or network
- 7. Process of verifying identity
- 8. Software designed to harm a device or network
- 9. Unauthorized access to a device or network
Down
- 1. Criminal activity carried out using technology
- 2. Malicious attempt to damage or disrupt a computer system
- 3. Weakness in a system that can be exploited
- 4. Fraudulent attempt to gain sensitive information
- 5. System designed to prevent unauthorized access
- 6. Method of protecting information