Across
- 1. Bring your own device
- 2. Proves human, not bot
- 3. Internet-based data storage
- 5. Network of infected computers
- 6. Decoy system for attackers
- 10. Breaks into computer systems
- 11. Takes advantage of vulnerability
- 13. Secretly collects user data
- 14. Protects against computer viruses
- 15. Malicious software
- 16. Verifies user identity
- 17. Encrypts internet connections
Down
- 1. Secret access to system
- 4. AI-generated fake video
- 5. Blocks unauthorized entities
- 7. Disguised malicious software
- 8. Demands payment for data
- 9. Blocks unauthorized network access
- 12. Fraudulent data collection attempt
- 14. Unwanted advertising software