Across
- 1. weaponized software
- 7. trying to "hook" sensitive data
- 8. used to run untrusted code
- 10. protects device against digital infections
- 12. apart of the login process
- 13. monitors user activity
Down
- 2. converts data into code
- 3. can capture passwords
- 4. network protector
- 5. strong, long, and unique
- 6. masks IP address
- 9. security update
- 11. software disguised to look safe
