Across
- 3. unlocks data for a price
- 8. text phishing
- 10. prolonged cyber attack
- 13. used for large scale attacks
- 14. self replicating malware
- 16. ai generated images/video
- 17. cybercriminal hacker
- 18. prevents unauthorized access
- 19. tricks user into clicking something
Down
- 1. floods target with traffic
- 2. never trust, always verify
- 4. man in middle
- 5. malware disguised as real program
- 6. pretending to be legitimate
- 7. phone or voice to trick individuals
- 9. privacy network
- 11. secretly monitors activity
- 12. controls traffic entering/leaving
- 15. software designed to harm
- 16. unauthorized access of personal data
