Across
- 4. Software flaw
- 6. Converts data into a coded form for security
- 7. Unwanted email messages
- 9. Malicious software disrupts, damages, or gains unauthorized access.
- 10. Password guessing attack
Down
- 1. Deceptive emails to steal information
- 2. Controls traffic entering and leaving a network
- 3. Self-replicating malware
- 4. Network of infected computers
- 5. overwhelms network with traffic
- 8. Harmful software disrupts or steals data
