Keyloggers: The Silent Typing Thieves (EN)

12345678910
Across
  1. 2. - Image capture of what appears on-screen
  2. 3. - Apply patches to software or OS
  3. 4. - Two or more authentication factors (short form)
  4. 7. - Network security that blocks unwanted traffic
  5. 8. - Fraudulent emails/links that trick users into installing malware
  6. 10. - Copy of data stored to recover after compromise
Down
  1. 1. - Possible hardware keylogger disguised as a device
  2. 5. - Software that scans for malicious programs
  3. 6. - Software or device that records keystrokes
  4. 9. - Secret word or phrase you type to authenticate