Across
- 2. The process of converting information into a code for security
- 7. A saved copy of data for recovery after loss or attack
- 10. A software update that fixes security vulnerabilities
- 12. Manipulating people into revealing confidential information
- 14. Software that secretly monitors your computer activities
Down
- 1. Malicious software that locks files until a payment is made
- 3. A login method requiring two forms of verification
- 4. A scam email or message tricking you into giving personal information
- 5. A network of infected devices controlled remotely
- 6. A program that detects and removes malicious software
- 8. A secret string used to secure accounts
- 9. Malicious software designed to damage or gain access to a system
- 11. A network security system that blocks unauthorized access
- 13. A service that creates a secure tunnel for internet traffic
