Cyber Security

1234567891011121314151617181920
Across
  1. 1. Secures internet connection
  2. 3. Network of infected computers
  3. 4. Decoy system for hackers
  4. 10. Blocks unauthorized access
  5. 12. Hides malicious processes
  6. 14. Unknown software flaw
  7. 16. Locks data for payment
  8. 17. Converts data to code
  9. 18. Secretly monitors activity
  10. 20. Overloads servers with traffic
Down
  1. 2. Fixes software vulnerabilities
  2. 5. Scrambles data for secrecy
  3. 6. Hidden access point
  4. 7. Records typed keystrokes
  5. 8. Encrypts web communications
  6. 9. Fake emails trick users
  7. 11. Malicious software program
  8. 13. Extra login verification
  9. 15. Detects and removes malware
  10. 19. Self-replicating malware