Across
- 3. attacks seeking out personal information
- 5. malware that reproduces itself
- 7. multiple steps to log in
- 8. software that displays ads
- 11. a mischeivious hacker
- 12. lots of attackers preventing legitimate users
- 13. scrambling data so it cant be read
- 16. happens when a hacker is successful
- 17. devices controlled by malware
- 18. shield for data
- 19. media changed to look authentic
Down
- 1. software that checks for malware
- 2. software that tracks you
- 4. apps that give computers instructions
- 5. network pro learning hacking techniques
- 6. software that is harmful
- 9. malware that makes you pay
- 10. tricks users into clicking on harmful links
- 14. malware pretending to be useful
- 15. internet access at starbucks
