System Vulnerabilities

12345
Across
  1. 3. A strong example would include a mixture of capital and lowercase letters, numbers and symbols.
  2. 5. WiFi connections with no passwords can be described as...
Down
  1. 1. These are small software updates
  2. 2. Using trial-and-error to guess log in details
  3. 4. Hardware and software make up a computer ......