Across
- 3. Breaks into computer systems
- 6. Verifies user identity
- 8. AI-generated fake video
- 10. Secret access to system
- 11. Demands payment for data
- 12. Malicious software
- 13. Proves human, not bot
- 14. Network of infected computers
- 17. Encrypts internet connections
- 19. Bring your own device
- 20. Disguised malicious software
Down
- 1. Protects against computer viruses
- 2. Fraudulent data collection attempt
- 4. Unwanted advertising software
- 5. Blocks unauthorized entities
- 7. Decoy system for attackers
- 9. Blocks unauthorized network access
- 15. Takes advantage of vulnerability
- 16. Internet-based data storage
- 18. Secretly collects user data