Across
- 2. locks files for money
- 5. network of infected devices
- 6. secretly tracks user activity
- 9. disguised malicious program
- 13. detects and removes threats
- 14. takes advantage of vulnerability
- 15. harmful software infection
Down
- 1. protects sensitive data
- 3. verifies user identity
- 4. secret login key
- 7. breach unauthorized data exposure
- 8. unauthorized system intruder
- 10. fake email scam
- 11. secure private connection
- 12. network security barrier
