Cybersecurity
Across
- 1. Overloads a site to shut it down
- 4. Blocks unauthorized network access.
- 7. Fixes bugs or security flaws.
- 8. Scrambles data to keep it safe.
- 9. Gives access permission.
- 10. Harmful software that damages systems.
- 13. Fake messages tricking you for info.
- 15. Turns data into fixed code.
Down
- 2. Makes scrambled data readable.
- 3. New flaw with no fix yet.
- 5. Confirms identity
- 6. Secretly tracks user activity
- 11. Locks files and demands payment.
- 12. Hides your IP and secures connection
- 14. Finds and removes viruses