Across
- 2. – Blocks unauthorized network traffic
- 5. – Tracks browsing activity
- 6. – Secure private network tunnel
- 7. – Harmful software program
- 9. – Network of infected computers
- 11. – Disguised harmful program
- 13. – Secret login credential
- 15. – Fixes software vulnerability
- 18. – Fake email scam attempt
- 20. – Self-replicating malware
Down
- 1. – Records keystrokes secretly
- 3. – Extra login verification step
- 4. – Collects user information secretly
- 8. – Scrambles data for security
- 10. – Locks files for payment
- 12. – Protects against malware
- 14. – Translates domain to IP
- 16. – Unwanted bulk email
- 17. – Hides malicious software
- 19. – Breaks into systems
