Across
- 1. Extra layer of login protection using two methods
- 3. Private information about a person
- 6. Copy of data kept in case of loss
- 10. Unauthorized person who breaks into computers
- 11. Scrambling data so it cannot be read easily
Down
- 2. Program that detects and removes malicious software
- 4. A type of harmful software
- 5. Criminal trick email attack
- 7. Unique name that identifies a user online
- 8. Data sent over a network
- 9. A strong password should contain these
- 12. Secret word or phrase used to access an account
