Cybersecurity

12345678910111213
Across
  1. 1. weaponized software
  2. 7. trying to "hook" sensitive data
  3. 8. used to run untrusted code
  4. 10. protects device against digital infections
  5. 12. apart of the login process
  6. 13. monitors user activity
Down
  1. 2. converts data into code
  2. 3. can capture passwords
  3. 4. network protector
  4. 5. strong, long, and unique
  5. 6. masks IP address
  6. 9. security update
  7. 11. software disguised to look safe