Across
- 7. It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- 8. It is the process of validating a cryptocurrency transaction.
- 10. The programs and other operating information used by a computer.
Down
- 1. Using, requiring, or involved in high technology or short for high technology.
- 2. Criminal activities carried out by means of computers or the internet.
- 3. An arrangement of intersecting horizontal and vertical lines.
- 4. The state of being connected or interconnected.
- 5. A legal or other formal measure intended to preserve civil liberties and rights .
- 6. A cryptocurrency, a virtual currency or a digital currency.
- 9. Wrongful or criminal deception intended to result in financial or personal gain.