Across
- 4. trustable storage of sensitive information
- 6. prevents attacks to computer
- 9. debris from electronic devices
- 11. voice, face, retina, fingerprint
- 13. acronym for uninterruptible power supply
- 17. providing validation for access
- 19. changes device's address
- 20. cyber attackers with no knowledge
Down
- 1. emails designed for advertisement
- 2. dangerous software that will duplicate
- 3. believe they're doing right
- 5. dangerous software that causes corruption
- 7. theft "is not a joke Jim"
- 8. threats to security
- 10. result in loss or injury
- 12. makes authentication more powerful
- 14. another term: black hat hackers
- 15. looks harmless, infects device
- 16. searching data to uncover information
- 18. how much cybersecurity costs annually