Across
- 3. Blocks unauthorized network access
- 5. Guessing passwords repeatedly
- 6. Simulated hacking for security testing
- 8. Secret for decrypting data
- 9. Overloads a website’s server
- 11. Software designed to harm systems
- 12. Shared for encrypted messages
- 15. Exploit with no known fix
- 18. Disguised as harmless software
- 19. Code inserted into databases
- 20. Encrypts internet traffic for privacy
Down
- 1. Locks files, demands payment
- 2. Records what you type
- 4. Converts data into secret code
- 7. Secretly monitors user activity
- 10. Tricking people for access
- 13. Network of hacked computers
- 14. Extra login security step
- 16. Scrambles data into fixed code
- 17. Fraudulent emails tricking users
