Across
- 4. personal code to log into your devices
- 5. Secure network tunnel
- 6. Verifying identity
- 7. Dual-layer authentication
- 10. Holds data hostage
- 11. Fakes digital identity
- 12. Engineering Manipulates human behavior
- 14. Data scrambling for privacy
- 16. Network security barrier
- 18. Detects and removes malware
- 20. Redirects to fake sites
Down
- 1. Malicious digital intrusion
- 2. Software with malicious intent
- 3. Device in a network
- 5. Weakness in security
- 8. Software update for security
- 9. Records keystrokes
- 13. Authentication via body traits
- 15. Malicious program's function
- 17. Deceptive email tactic
- 19. Unauthorized access point
