Across
- 3. verifying a users identity
- 6. Secret key to unlock phone
- 7. conveying data onto a fixed value
- 8. part internet used for illegal activities
- 9. Self replicating malware
- 13. Cyberattack that trick's people
- 15. Program with hidden harmful intent
- 16. Secure network connection
- 17. Network devices protection
- 18. unauthorized access exploit
- 19. Securing data by converting to a code
Down
- 1. software that is designed to harm
- 2. the harmful portion of malware
- 4. Unauthorized access to data
- 5. A network of computers that have been infected
- 10. malware that locks data until paid
- 11. software that collects users data
- 12. software that removes malware
- 14. Taking advantage of a security vulnerability
- 20. a software update that fixes bugs
