Cyber 2

12345678910
Across
  1. 3. Updating software for security
  2. 6. Disguised malware
  3. 8. Captures typed keystrokes
  4. 9. Floods server with traffic
  5. 10. Advertising-supported software
Down
  1. 1. Targeted email scam
  2. 2. Faking identity or data
  3. 4. Network of infected devices
  4. 5. Dual authentication method
  5. 7. Unauthorized access point