Across
- 2. - Image capture of what appears on-screen
- 3. - Apply patches to software or OS
- 4. - Two or more authentication factors (short form)
- 7. - Network security that blocks unwanted traffic
- 8. - Fraudulent emails/links that trick users into installing malware
- 10. - Copy of data stored to recover after compromise
Down
- 1. - Possible hardware keylogger disguised as a device
- 5. - Software that scans for malicious programs
- 6. - Software or device that records keystrokes
- 9. - Secret word or phrase you type to authenticate
