Across
- 2. Everyone can use to encrypt
- 6. Authentication with physical traits
- 9. Accesses systems with technical skills
- 12. Counting system with two digits
- 13. Key aspect in scam tactics
- 15. Malicious computer code/software
- 16. Input, process, output, storage device
- 19. Malware disguised as benign program
- 20. Filters data for network security
Down
- 1. System of infected computers
- 3. Remote systems over the internet
- 4. Phishing using text messages
- 5. Secret code to decrypt data
- 7. Network not accessible by public
- 8. Network accessible by anyone, anywhere
- 10. Malware that demands payment
- 11. Connects home network to internet
- 14. A way to secure data
- 17. Authentication using multiple types
- 18. Converts digital data into analog
- 21. Simulate human intelligence
