Security Terminology Puzzle (Participation 3)

1234567891011121314151617181920
Across
  1. 3. security program looking for malware
  2. 5. multiple devices trying to flood a site in order to shut it down
  3. 8. malicious software
  4. 9. a network of computers used to carry out cyberattacks
  5. 10. a unique string of numbers that identifies a device
  6. 11. virtual private network
  7. 13. online harassment
  8. 14. media manipulation of an image or video to create a false reality
  9. 17. attack that exploits a vulnerability in software for the first time
  10. 18. collecting private information without consent
  11. 19. tries to gather your private information
  12. 20. cyber attack to tricks users into clicking on hidden elements
Down
  1. 1. wifi that is public to everyone in range
  2. 2. when sensitive data was leaked
  3. 4. an attack that wants money for access to your system back
  4. 6. protection against unauthorized access to data
  5. 7. protection codes
  6. 12. malware that appears to be harmless
  7. 15. a method of scrambling data so only authorized users have access
  8. 16. a trend in which people use person devices instead of work provided devices