Safe Computing
Across
- 5. Locks data for ransom
- 6. Hidden malicious web clicks
- 9. containing suspicious files in isolation
- 15. Hidden data in files
- 18. Fixes security vulnerabilities
- 19. Scrambles data for security
- 21. Fake system traps hackers
Down
- 1. Block unauthorized network
- 2. records keyboard keystrokes
- 3. Secure encrypted online tunnel
- 4. Damage to system becomes unusable
- 7. Unauthorized data transfer
- 8. Malicious software program
- 10. Secret system access method
- 11. Fake emails to trick victim
- 12. Secretly monitors user activity
- 13. Self-spreading malicious code
- 14. Network of infected devices
- 16. Displays unwanted pop ads
- 17. Converts data into digest
- 20. Disguised program carrying hidden threat