Cyber Cross puzzle
Across
- 4. Malware disguised as legitimate.
- 6. BONUS: THIS IS THE PASSCODE FOR THE ANSWERS. Don't use "x" for your x.
- 7. Records keystrokes secretly.
- 9. Demands payment to unlock data.
- 10. Code injection attack.
- 11. Exploit unknown to developers.
- 14. Monitors and controls network traffic.
- 16. Malware that hides its presence.
- 17. Network of infected computers.
- 19. Secure private network connection.
- 20. Software designed to harm.
Down
- 1. Software to detect and remove malware.
- 2. Overwhelms server with traffic.
- 3. Systematic password guessing.
- 5. Hidden access to a system.
- 8. Software update to fix vulnerabilities.
- 12. Converts data into code.
- 13. Authentication: Adds extra security layer.
- 15. Manipulating people for info.
- 18. Malware that spies on users.