| ENCRYPTION | The process of converting data or information into code, often to prevent unauthorised access (10) |
| ENCRYPT | To convert e.g. data or text into code, often to prevent unauthorised access (7) |
| DATABASE | Any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. (8) |
| ENCODED | Put secret information into code (7) |
| WINEMAKERS | Vintners who often collaborate with viticulturists and oenologists in the vinification process of converting grapes into rose, rouge or vin blanc (10) |
| STATISTICS | Numerical data or facts (10) |
| SENTRY | A soldier who guards or prevents unauthorised access to a place or keeps watch for danger (6) |
| SPINNING | Process of converting wool, silk, cotton or flax into yarn; or, a form of cardio on a stationary bike (8) |
| FIREWALL | Part of a computer network which prevents unauthorised access while permitting outward communication (8) |
| LIQUIDATION | Process of converting securities or commodities into cash |
| TANNING | Process of converting hide into leather |
| PASSWORD | Old man's weapon that prevents unauthorised access? |
| YEAST | Any of various single-celled fungi of the genus Saccharomyces and related genera, capable of converting sugar into alcohol and carbon dioxide (5) |
| TAN | Brown skin coloring from exposure to the sun / method of converting raw hide into leather |
| SALIC | ____ law was a legal code, often equated with the exclusion of women from inheritance |
| HACKER | One who attempts to gain unauthorised access, usually remotely, to a computer system or network (6) |
| SHACK | Only a second to gain unauthorised access to other computers in the building (5) |
| FILE | A box or folder for papers; a line of soldiers; a collection of computer data; or, an emery board or rasp (4) |
| CYBERSECURITY | The protection of computers and networks against unauthorised access and sabotage (13) |
| HACKING | Journalist in Germany's capital gaining unauthorised access to a computer's data (7) |