safe computing assignment

12345678910111213141516171819
Across
  1. 1. Attack traffic to take servers down
  2. 4. scrambles data for protection
  3. 8. network of infected computers
  4. 10. manipulating into confidential info
  5. 13. hides malware
  6. 14. records keynotes
  7. 15. hides IP
  8. 17. identity check
  9. 19. stealing data from emails
Down
  1. 2. watches and sends information to others
  2. 3. malware disguised as program
  3. 5. fix for volnurability
  4. 6. attack targeting vulnerabilities of software
  5. 7. blocks unauthorized access
  6. 9. knowledge about cyber threats
  7. 11. hacking to find flaws
  8. 12. providing identity
  9. 16. tries everything to gain access
  10. 18. locks data until paid for