Data Security

12345678910111213
Across
  1. 3. Deleting data so it cannot be recovered easily.
  2. 4. Physically destroying storage devices.
  3. 7. A secret word to log in.
  4. 9. Software that removes malware.
  5. 11. Uses fingerprints or face scans to identify users.
  6. 13. Data backed-up away from the main building.
Down
  1. 1. Used to enter a PIN.
  2. 2. Checking user identity.
  3. 5. Uses two ways to log in.
  4. 6. Rules about what users can access.
  5. 8. Blocks unsafe network traffic.
  6. 10. Scrambling data to keep it secret.
  7. 12. Uses radio waves to read data from a card.