Across
- 2. Encrypts data on internet
- 9. Recording key strokes
- 10. Software that hides itself
- 11. Convert data into code
- 13. Locked until paid
- 17. Monitor and control traffic
- 18. From inside the organization
- 19. Investigating cyber crimes
- 20. Trying everything
Down
- 1. Secretly monitoring
- 3. Limit who can access network
- 4. Malicious software
- 5. Understand and prevent threats
- 6. remotely compromised computers
- 7. Social engineering attack
- 8. Manipulating people into giving info
- 12. Overwhelming a system
- 14. Ways to verify identity
- 15. Unknown to vendor
- 16. Updating Software
