Across
- 3. An update that fixes security vulnerabilities.
- 4. Online servers used to store data.
- 5. Security system that blocks or allows network traffic.
- 6. Malware that spreads itself without human interaction.
- 8. Process of converting data into a secure, unreadable format.
- 11. Secret word or phrase used to access accounts.
- 12. Malware disguised as legitimate software.
- 13. A vulnerability unknown to the vendor, exploited by hackers.
Down
- 1. Hidden access point used by attackers to bypass security.
- 2. Software designed to harm, exploit, or disable systems.
- 3. Fake emails that trick people into giving up sensitive info
- 7. Tool that encrypts your internet connection and hides your IP address.
- 9. Malware that locks files and demands payment.
- 10. Software that secretly monitors your activities.
