Across
- 3. system sentinel
- 5. self-replicating, damages computer system
- 7. data matches the truth
- 10. gathers information
- 13. software designed to disrupt and damage
- 14. Restricted Access
- 15. authentication
- 18. bogus website
- 20. recovery
- 22. virtual autograph
Down
- 1. your digital insurance policy
- 2. predefined criteria
- 4. accuracy, consistency and reliability
- 6. bomb triggered based on condition
- 8. network gatekeeper
- 9. fraud email
- 11. last in line, yet first to spot the mistake
- 12. self-replicating and spreads through network
- 16. Protection of sensitive information
- 17. extra bit that keeps the total in line
- 19. horse
- 21. can launch attacks
