Security

12345678910111213141516171819202122
Across
  1. 3. system sentinel
  2. 5. self-replicating, damages computer system
  3. 7. data matches the truth
  4. 10. gathers information
  5. 13. software designed to disrupt and damage
  6. 14. Restricted Access
  7. 15. authentication
  8. 18. bogus website
  9. 20. recovery
  10. 22. virtual autograph
Down
  1. 1. your digital insurance policy
  2. 2. predefined criteria
  3. 4. accuracy, consistency and reliability
  4. 6. bomb triggered based on condition
  5. 8. network gatekeeper
  6. 9. fraud email
  7. 11. last in line, yet first to spot the mistake
  8. 12. self-replicating and spreads through network
  9. 16. Protection of sensitive information
  10. 17. extra bit that keeps the total in line
  11. 19. horse
  12. 21. can launch attacks