Across
- 2. Stolen sensitive information
- 5. Hidden system control malware
- 7. Records typed keystrokes
- 10. Security update fix
- 13. Verifying user identity
- 15. Scrambles data for protection
- 18. Maleware disguised as safe
- 19. Authentication Two login verification steps
- 20. Force Guessing passwords repeatedly
Down
- 1. Secretly monitors user activity
- 3. Breaks into system
- 4. Blocks unauthorized network access
- 6. Network of infected computers
- 8. Fake email scam
- 9. Malicious Software
- 11. Detects malicious programs
- 12. Secret login phrase
- 14. Secure private connection
- 16. Locks files for payment
- 17. Unknown security vulnerability
