Across
- 4. Malware that encrypts files for ransom
- 5. Network of infected devices
- 6. Small data file stored by websites
- 9. Software that secretly monitors activity
- 11. Scrambling data for security
- 12. Person who exploits system vulnerabilities
- 13. Remote data storage and computing
Down
- 1. Fraudulent attempts to steal info
- 2. Harmful software like viruses
- 3. Authentication using fingerprints
- 4. Directs internet traffic
- 5. Decentralized ledger technology
- 7. Malware disguised as legitimate software
- 8. Secures internet connections
- 10. Network security barrier
