Across
- 1. Secures internet connection
- 3. Network of infected computers
- 4. Decoy system for hackers
- 10. Blocks unauthorized access
- 12. Hides malicious processes
- 14. Unknown software flaw
- 16. Locks data for payment
- 17. Converts data to code
- 18. Secretly monitors activity
- 20. Overloads servers with traffic
Down
- 2. Fixes software vulnerabilities
- 5. Scrambles data for secrecy
- 6. Hidden access point
- 7. Records typed keystrokes
- 8. Encrypts web communications
- 9. Fake emails trick users
- 11. Malicious software program
- 13. Extra login verification
- 15. Detects and removes malware
- 19. Self-replicating malware
