Cybersecurity

1234567891011121314151617181920
Across
  1. 1. Blocks unauthorized access
  2. 4. User authentication string
  3. 5. Hides system access
  4. 7. Overloads a server
  5. 9. Software security fix
  6. 10. Tracks online activity
  7. 12. Adds login security
  8. 16. Records keystrokes typed
  9. 17. Protects against malware
  10. 18. Harmful software program
  11. 19. Secure network tunnel
  12. 20. Network of hijacked devices
Down
  1. 2. Self-replicating virus
  2. 3. Locks files for payment
  3. 6. Malware disguised software
  4. 8. Secretly collects data
  5. 11. Secures data with code
  6. 13. Fake email scam
  7. 14. Decoy system trap
  8. 15. Unknown software flaw