Cyber security

1234567891011121314151617181920
Across
  1. 2. – Blocks unauthorized network traffic
  2. 5. – Tracks browsing activity
  3. 6. – Secure private network tunnel
  4. 7. – Harmful software program
  5. 9. – Network of infected computers
  6. 11. – Disguised harmful program
  7. 13. – Secret login credential
  8. 15. – Fixes software vulnerability
  9. 18. – Fake email scam attempt
  10. 20. – Self-replicating malware
Down
  1. 1. – Records keystrokes secretly
  2. 3. – Extra login verification step
  3. 4. – Collects user information secretly
  4. 8. – Scrambles data for security
  5. 10. – Locks files for payment
  6. 12. – Protects against malware
  7. 14. – Translates domain to IP
  8. 16. – Unwanted bulk email
  9. 17. – Hides malicious software
  10. 19. – Breaks into systems