Across
- 4. Encrypts a device or network in order to extort
- 5. Software intended to infiltrate and damage or disable devices
- 6. Prevents unauthorised access to a device or network
- 7. The transformation of data to hide its information content
- 9. Detects and removes malicious software
- 10. Using body measurements to authenticate
Down
- 1. All the data marks you leave behind when you are online
- 2. Making a copy of data
- 3. A secret series of characters used to authenticate a person’s identity
- 8. A person who performs a cyber attack or causes an accident
