Across
- 1. Click every traffic light in this image.
- 3. Encrypt files to extort money.
- 5. Fake email link bait.
- 9. Proving your identity.
- 11. Sneaky peek a password.
Down
- 2. Brute force uses many attempts to guess it.
- 4. Denial of Service attacks this.
- 6. Blocks incoming and outgoing connections.
- 7. Automated internet task software.
- 8. Unauthorised access to computer systems.
- 10. Horse with a hidden suprise.