Across
- 1. Copy of important files
- 4. Unauthorized data access
- 6. Network security barrier
- 7. Extra login verification
- 9. Private secure connection
- 13. Software security update
- 14. Locks files for payment
- 18. Scramble data for safety
- 19. Harmful computer software
- 20. Self spreading malware
Down
- 2. Verify user identity
- 3. Secret login code
- 5. Records keyboard typing
- 8. Malware disguised as safe
- 10. Fake email scam
- 11. Person breaking into systems
- 12. Network of infected computers
- 15. Malware detection software
- 16. Code that abuses vulnerability
- 17. Software that secretly tracks
