Across
- 1. A document that explains how websites use your data
- 4. Extra layer of security that requires a code
- 8. Data scrambled for security
- 10. Using fake accounts to access restricted content
Down
- 2. Checking identity before giving access
- 3. Hidden malware disguised as legitimate software
- 5. Small text files that track your online activity
- 6. Security software that scans for threats
- 7. Technology that verifies you are human (used on websites)
- 9. A service that masks your IP address
