Across
- 1. Secure network connection.
- 2. Email scam tactic.
- 4. Self-replicating malware.
- 9. engineering Manipulating people for data.
- 10. Unauthorized access attempt.
- 12. Stealth force: Password cracking method.
- 13. Data encryption for ransom.
- 14. Network security barrier.
- 16. Faking identity or data.
- 18. Malicious program disguised as useful.
Down
- 1. Weakness in security.
- 3. Data protection method.
- 5. Harmful software.
- 6. Denial-of-Service attack.
- 7. Unique physical traits.
- 8. Authentication method.
- 11. Secure website protocol.
- 15. Computer protection software.
- 17. Software update for security.