Across
- 7. - Protecting data with secret codes.
- 8. - Verifying identity or access rights.
- 10. - Malware demanding payment for data access.
- 11. - Duplication or excess in systems or staff.
- 12. - Characteristics that define a person or entity.
Down
- 1. - Small, temporary fault or error.
- 2. - Malicious attempt to disrupt or exploit.
- 3. - Controlling the spread of a threat.
- 4. - State of disorder or confusion.
- 5. - Data secretly stolen or removed without permission.
- 6. - Examine or inspect systematically for issues.
- 8. - Software displaying unwanted advertisements.
- 9. - Complex and advanced in design or function.
