Across
- 2. Protective barrier against spyware and viruses
- 7. Hidden data left by websites on browsers
- 8. Process to confirm user identities
- 9. Security flaw in software waiting to be patched
- 10. A backup copy stored in a separate location
Down
- 1. A Scam via mobile messaging
- 3. Verifying that data hasn’t been altered
- 4. Unauthorized software modification to gain access
- 5. A fake digital identity created for fraud
- 6. Prevents system access until ransom is paid
