Across
- 4. Blocks online threats
- 5. Uses body parts for login
- 7. Stores data online
- 9. Scrambles data
- 10. Extra login security step
- 13. Makes software current
- 14. Deceptive website link
- 15. Hidden part of the internet
- 18. Breaks into systems
- 19. Creates digital internet signals
Down
- 1. Tracks keystrokes
- 2. Unwanted emails
- 3. Spreads and infects
- 6. Copies data for safety
- 7. Certification for cisco network
- 8. Hides online location
- 11. Enters an account
- 12. Tests for real users
- 16. Used to access the internet
- 17. Secret word for access