PF10 Crossword

12345678910
Across
  1. 3. _____ Authentication. Where two different methods are needed to gain access e.g banking apps for an online purchase (4)
  2. 7. Application Planning _________ These allow 2 or more systems to communicate, so long as the customer has authorized payment. (10)
  3. 8. A criminal act that involves some kind of illegal attack on computers and networks. (10)
  4. 9. ______ banking allows customers to securely share their bank and credit card data with trusted third parties (4)
  5. 10. Storage data services via the internet that is uploaded rather than saved on a hard drive allowing easy access from anywhere (5)
Down
  1. 1. software designed to infiltrate computer systems like viruses, worms and trojan horses (7)
  2. 2. Combination of the words ‘financial’ and ‘technology’ to describe technology-enabled innovation (7)
  3. 4. Stealing customers data by pretending to be be someone else to gain trust and get their personal info or log in details (8)
  4. 5. Security on a computer that filters traffic to prevent harmful data (8)
  5. 6. Infiltrating computers by getting unauthorized access to their networks (7)