CyBeRsEcUrItY

1234567891011121314151617181920
Across
  1. 3. Breaks into computer systems
  2. 6. Verifies user identity
  3. 8. AI-generated fake video
  4. 10. Secret access to system
  5. 11. Demands payment for data
  6. 12. Malicious software
  7. 13. Proves human, not bot
  8. 14. Network of infected computers
  9. 17. Encrypts internet connections
  10. 19. Bring your own device
  11. 20. Disguised malicious software
Down
  1. 1. Protects against computer viruses
  2. 2. Fraudulent data collection attempt
  3. 4. Unwanted advertising software
  4. 5. Blocks unauthorized entities
  5. 7. Decoy system for attackers
  6. 9. Blocks unauthorized network access
  7. 15. Takes advantage of vulnerability
  8. 16. Internet-based data storage
  9. 18. Secretly collects user data