Across
- 3. _____ Authentication. Where two different methods are needed to gain access e.g banking apps for an online purchase (4)
- 7. Application Planning _________ These allow 2 or more systems to communicate, so long as the customer has authorized payment. (10)
- 8. A criminal act that involves some kind of illegal attack on computers and networks. (10)
- 9. ______ banking allows customers to securely share their bank and credit card data with trusted third parties (4)
- 10. Storage data services via the internet that is uploaded rather than saved on a hard drive allowing easy access from anywhere (5)
Down
- 1. software designed to infiltrate computer systems like viruses, worms and trojan horses (7)
- 2. Combination of the words ‘financial’ and ‘technology’ to describe technology-enabled innovation (7)
- 4. Stealing customers data by pretending to be be someone else to gain trust and get their personal info or log in details (8)
- 5. Security on a computer that filters traffic to prevent harmful data (8)
- 6. Infiltrating computers by getting unauthorized access to their networks (7)
