Across
- 5. Middle man wifi network attack.
- 8. Hacker hired to test security.
- 9. Scrambling data to prevent theft.
- 12. Malicious elements that trick users.
- 15. Website temporarily shutting down.
- 17. Malicious commands.
- 18. Network of infected computers.
- 20. Malware that 'spies' on users.
Down
- 1. Software designed to hurt computer systems.
- 2. Verifies your identity.
- 3. Online harassment.
- 4. Cyber attack that includes fake sensitive info.
- 6. Protects a device from attack.
- 7. AI images showing Trump's Arrest.
- 10. Used during the encryption process.
- 11. Private network that uses encryption.
- 13. Unique device network identifier.
- 14. Demands ransom to regain access to computers.
- 16. Hacker changes IP address of email.
- 19. Higher risk of business security breach.
