Across
- 2. Network security barrier.
- 4. Weakness in security.
- 6. Data protection method.
- 8. Malicious program disguised as useful.
- 9. Faking identity or data.
- 11. Secure website protocol.
- 14. Self-replicating malware.
- 16. Unauthorized access attempt.
- 17. Software update for security.
- 18. Harmful software.
Down
- 1. Authentication method.
- 3. Stealth force: Password cracking method.
- 4. Secure network connection.
- 5. Unique physical traits.
- 7. Data encryption for ransom.
- 10. Email scam tactic.
- 12. Computer protection software.
- 13. Denial-of-Service attack.
- 15. engineering Manipulating people for data.