Cybersecurity

123456789101112131415
Across
  1. 2. locks files for money
  2. 5. network of infected devices
  3. 6. secretly tracks user activity
  4. 9. disguised malicious program
  5. 13. detects and removes threats
  6. 14. takes advantage of vulnerability
  7. 15. harmful software infection
Down
  1. 1. protects sensitive data
  2. 3. verifies user identity
  3. 4. secret login key
  4. 7. breach unauthorized data exposure
  5. 8. unauthorized system intruder
  6. 10. fake email scam
  7. 11. secure private connection
  8. 12. network security barrier