Digital Communications

123456789
Across
  1. 1. Procedures used to protect data from unauthorised access
  2. 4. A very obvious password
  3. 7. Act of spies hacking or infiltrating internet systems
  4. 8. Attackers impersonate legitimate entities, often through emails or fake websites
  5. 9. The first form of the Internet
Down
  1. 2. Set of 8 characters either 0's or 1's
  2. 3. Small bundles of data
  3. 5. Malicious software
  4. 6. Common web search engine