Cyber Security
Across
- 3. Unsolicited bulk emails
- 4. Deceptive email tactic
- 8. Software for detecting and removing malware
- 10. Harmful software
- 11. Unauthorized access seeker
- 13. Verification process
- 15. Newly discovered vulnerability
- 16. Secure data transmission protocol
- 17. Secure network connection
- 18. Network of infected computers controlled remotely
- 19. Denial of Service attack
Down
- 1. Malicious software demanding payment
- 2. Weakness in a system's security
- 4. Access code
- 5. Network security barrier
- 6. Identity verification using unique physical traits
- 7. Protection of internet-connected systems and data
- 9. Software update
- 12. Data protection method
- 14. Malware disguised as legitimate software