24

12345678910111213141516171819202122232425
Across
  1. 3. Speeds up access
  2. 5. Retrieve data
  3. 7. Restore settings
  4. 9. Mediates connections
  5. 10. Temporary data storage
  6. 12. Harmful software
  7. 14. Blocks access for ransom
  8. 15. Interpret data
  9. 17. Prepare storage device
  10. 19. Malicious code
  11. 24. System failure
  12. 25. Secure data
Down
  1. 1. Convert data
  2. 2. Exchange data
  3. 4. Restart system
  4. 6. Disguised malware
  5. 8. Secretly gathers data
  6. 11. Blocks unauthorized access
  7. 13. Fix errors
  8. 16. Reduce file size
  9. 18. Unlock data
  10. 20. Transmit data continuously
  11. 21. Synchronize data
  12. 22. Divide storage
  13. 23. Deceptive data gathering