Across
- 3. Authentication using physical characteristics
- 9. Transmits information about users activity
- 12. Something hackers can't exploit
- 14. An advanced fee fraud
- 15. Users online activity left behind
- 18. Shared computer and storage resources
- 19. Call to commit identity theft
- 20. Designed to detect hacking
Down
- 1. Designed to protect personal data
- 2. A network of infected devices
- 4. Disguised as legitimate software
- 5. Gathers information about browsing history
- 6. Malicious attempts to damage
- 7. Program that can automate tasks
- 8. Software designed to detect viruses
- 10. Applying updates to firmware
- 11. Software that installs itself secretly
- 13. High targeted phishing attacks
- 16. Prevents unauthorized access to network
- 17. Mass emails sent to people
