Cybersecurity
Across
- 1. Blocks unauthorized access
- 4. User authentication string
- 5. Hides system access
- 7. Overloads a server
- 9. Software security fix
- 10. Tracks online activity
- 12. Adds login security
- 16. Records keystrokes typed
- 17. Protects against malware
- 18. Harmful software program
- 19. Secure network tunnel
- 20. Network of hijacked devices
Down
- 2. Self-replicating virus
- 3. Locks files for payment
- 6. Malware disguised software
- 8. Secretly collects data
- 11. Secures data with code
- 13. Fake email scam
- 14. Decoy system trap
- 15. Unknown software flaw