Beware of Cyber Attacks

1234567891011121314151617181920
Across
  1. 2. software that secretly monitors users
  2. 3. malicious software designed to harm
  3. 5. malicious code attached to programs
  4. 7. fakes identity to deceive targets
  5. 9. fraudulent emails to steal information
  6. 11. network of compromised devices remotely controlled
  7. 12. gains unauthorized access to systems
  8. 13. takes advantage of system vulnerabilities
  9. 16. malware that tricks users into running
  10. 17. testing system defenses for weaknesses
  11. 18. secret way to bypass security
  12. 19. converts data into secret code
Down
  1. 1. records keystrokes for stealing data
  2. 4. displays unwanted advertisements to users
  3. 6. hides malicious software from detection
  4. 8. network protection from unauthorized access
  5. 10. self-replicating malware spreading automatically
  6. 14. malware disguised as legitimate software
  7. 15. demands payment to restore access
  8. 20. fixes security vulnerabilities in software