Cyber5ecur1ty Puzzl3

1234567891011121314151617181920
Across
  1. 3. encrypts files, demands money
  2. 6. isolated environment for testing
  3. 8. attack common at cafes (abv)
  4. 11. an email scam
  5. 13. malicious digital system breach
  6. 15. fixes software security flaws
  7. 16. secure, digital ledger
  8. 17. taking advantage of vulnerabilities
  9. 18. network of infected computers
  10. 19. malware disguised as software
  11. 20. a common online currency
Down
  1. 1. self-replicating malware spreader
  2. 2. many strokes per minute
  3. 4. searching for vulnerabilities
  4. 5. the machine code
  5. 7. blue light
  6. 9. scurried optic
  7. 10. blocks unauthorized internet traffic
  8. 12. harmful software to systems
  9. 14. hidden access to system
  10. 16. be 'sus' of this hacker