Across
- 4. DAY: Unknown software vulnerability.
- 5. Network's security guard.
- 9. Unauthorized system access.
- 11. Scrambling data for secrecy.
- 12. Malicious, damaging software.
- 15. Hooking for personal data.
- 17. Secret key to access.
- 19. Network of infected computers.
- 20. Self-replicating, infecting program.
Down
- 1. Displays unwanted ads.
- 2. Records your keystrokes.
- 3. Overwhelming a server.
- 6. Secret system entry.
- 7. Software bug fix.
- 8. FORCE: Guessing every password combination.
- 10. Spies on your computer.
- 13. Locks your data hostage.
- 14. Website redirection trick.
- 16. Faking a trusted identity.
- 18. Disguised malicious program.
