Across
- 3. The highest level of access allowing full control over system resources. (13/6 letters)
- 5. Rules or standards that define how data is transmitted over a network. (9 letters)
- 8. A type of backup that only saves changes made since the last backup. (11/6 letters)
- 9. A copy of data stored separately to be used for recovery in case of data loss. (6 letters)
- 10. The successor to SSL, providing enhanced security for data transmission. (3 letters)
- 11. A permission level where users can view but not modify files. (4/4/6 letters)
Down
- 1. Software that is designed to damage or disrupt a system. (7 letters)
- 2. Electronic documents used to authenticate the identity of users or websites. (7/12 letters)
- 4. A security protocol used for encrypting information over the internet. (3 letters)
- 6. A physical security measure using biological data, like fingerprints or iris scans, for authentication. (9/6 letters)
- 7. The process of converting data into a coded format to prevent unauthorized access. (10 letters)
