Across
- 3. Method of secure communication (12 letters).
- 8. Malware that demands payment to restore access (10 letters).
- 11. Software that collects information without consent (7 letters).
- 13. A group of interconnected devices (7 letters).
- 14. A potential danger or risk (6 letters).
- 15. Software that can infect your computer. (5 letters).
- 16. Information stored on a computer (4 letters).
- 18. Unauthorized access to a computer system (7 letters).
Down
- 1. Process of converting data into a code (11 letters).
- 2. A fraudulent scheme to deceive people (4 letters).
- 4. The practice of using two different authentication methods (10 letters).
- 5. A person who creates software.
- 6. Weakness in a system that can be exploited (13 letters).
- 7. Measures taken to protect against cyber threats (8 letters).
- 9. A person interacting with a computer system (4 letters).
- 10. A network security software. (8 letters).
- 12. A common email-based attack (8 letters).
- 17. Software to protect against malware (9 letters).