CyBeRsEcUrItY

1234567891011121314151617
Across
  1. 1. Bring your own device
  2. 2. Proves human, not bot
  3. 3. Internet-based data storage
  4. 5. Network of infected computers
  5. 6. Decoy system for attackers
  6. 10. Breaks into computer systems
  7. 11. Takes advantage of vulnerability
  8. 13. Secretly collects user data
  9. 14. Protects against computer viruses
  10. 15. Malicious software
  11. 16. Verifies user identity
  12. 17. Encrypts internet connections
Down
  1. 1. Secret access to system
  2. 4. AI-generated fake video
  3. 5. Blocks unauthorized entities
  4. 7. Disguised malicious software
  5. 8. Demands payment for data
  6. 9. Blocks unauthorized network access
  7. 12. Fraudulent data collection attempt
  8. 14. Unwanted advertising software