Across
- 2. Pretends to be a normal application
- 3. Software infected into a device
- 5. Forces users to pay a fee
- 7. network security
- 8. Attack Computers
- 11. Nationwide threat
- 12. captures keystrokes without user knowledge
- 13. process proving you are the real user
- 15. Promotes agendas through cyberattacks
- 17. pretends to be a company
Down
- 1. combats malware attacks
- 4. Pop-ups
- 6. a flaw in the system
- 8. used to protect devices
- 9. Looks for Vulnerabilities
- 10. face or fingerprint scan
- 11. Bullying
- 14. usually happens after a bug is found in the software
- 16. copies itself into programs
- 17. The key to a digital lock
