Across
- 4. Overwhelms servers with traffic
- 6. Scrambling data for security
- 8. Fraudulent attempt to steal data
- 10. Stealthy malware with deep access
- 11. Secures internet connections
- 15. Popular cryptocurrency
- 16. Malware that demands payment
- 17. Malware disguised as legitimate
- 18. Breaches systems illegally
Down
- 1. Remote data storage
- 2. Tracks keystrokes secretly
- 3. Network of infected devices
- 5. Uses fingerprints or face ID
- 7. Artificial intelligence
- 8. Software update fixing flaws
- 9. Software that spies on users
- 12. Harmful software like viruses
- 13. Network security barrier
- 14. Secret code for access
