Cyber Security Participation puzzle

12345678910111213141516171819
Across
  1. 3. attacks seeking out personal information
  2. 5. malware that reproduces itself
  3. 7. multiple steps to log in
  4. 8. software that displays ads
  5. 11. a mischeivious hacker
  6. 12. lots of attackers preventing legitimate users
  7. 13. scrambling data so it cant be read
  8. 16. happens when a hacker is successful
  9. 17. devices controlled by malware
  10. 18. shield for data
  11. 19. media changed to look authentic
Down
  1. 1. software that checks for malware
  2. 2. software that tracks you
  3. 4. apps that give computers instructions
  4. 5. network pro learning hacking techniques
  5. 6. software that is harmful
  6. 9. malware that makes you pay
  7. 10. tricks users into clicking on harmful links
  8. 14. malware pretending to be useful
  9. 15. internet access at starbucks