Cyber Security

1234567891011121314151617181920
Across
  1. 5. Secret code for account access
  2. 6. Protection for brand names or logos
  3. 9. Tricking users to steal information
  4. 11. Illegal copying of software
  5. 15. Keeping information secret
  6. 16. Verifying user identity
  7. 17. Copying work without credit
  8. 19. Sending unwanted bulk messages
  9. 20. Legal protection for original content
Down
  1. 1. Protects computers and data from attacks
  2. 2. Extra copy of data for safety
  3. 3. Ensures data is not altered
  4. 4. Information is accessible when needed
  5. 7. Blocks unauthorized network access
  6. 8. Control over personal information
  7. 10. Unauthorized access to systems
  8. 12. Moral rules for using technology
  9. 13. Protection for inventions
  10. 14. Online trail left by users
  11. 18. Software that removes malware