Cyber Security

12345678910111213141516171819
Across
  1. 3. Unsolicited bulk emails
  2. 4. Deceptive email tactic
  3. 8. Software for detecting and removing malware
  4. 10. Harmful software
  5. 11. Unauthorized access seeker
  6. 13. Verification process
  7. 15. Newly discovered vulnerability
  8. 16. Secure data transmission protocol
  9. 17. Secure network connection
  10. 18. Network of infected computers controlled remotely
  11. 19. Denial of Service attack
Down
  1. 1. Malicious software demanding payment
  2. 2. Weakness in a system's security
  3. 4. Access code
  4. 5. Network security barrier
  5. 6. Identity verification using unique physical traits
  6. 7. Protection of internet-connected systems and data
  7. 9. Software update
  8. 12. Data protection method
  9. 14. Malware disguised as legitimate software