Cyber Security

1234567891011121314151617181920
Across
  1. 1. Copy of important files
  2. 4. Unauthorized data access
  3. 6. Network security barrier
  4. 7. Extra login verification
  5. 9. Private secure connection
  6. 13. Software security update
  7. 14. Locks files for payment
  8. 18. Scramble data for safety
  9. 19. Harmful computer software
  10. 20. Self spreading malware
Down
  1. 2. Verify user identity
  2. 3. Secret login code
  3. 5. Records keyboard typing
  4. 8. Malware disguised as safe
  5. 10. Fake email scam
  6. 11. Person breaking into systems
  7. 12. Network of infected computers
  8. 15. Malware detection software
  9. 16. Code that abuses vulnerability
  10. 17. Software that secretly tracks