Across
- 4. "pretty good privacy"
- 6. private modification
- 7. corrective measures
- 9. private readability
- 10. pick out at risk information
- 12. react
- 14. awareness of intrusions
- 15. data restoration
Down
- 1. converting plain text for confidentiality
- 2. ability to access
- 3. multi-use accounts
- 5. illegal activity in cyberspace
- 8. verifying logins (acronym)
- 11. copyright protection
- 13. putting in controls