Across
- 3. Overloads a system to shut it down
- 5. Converting data into a fixed code for security
- 6. Update that fixes security flaws
- 7. Harmful software
- 11. Verifying a user’s identity
- 14. Converting encrypted data back to normal
- 15. Locks data and demands payment
Down
- 1. Newly discovered, unpatched vulnerability
- 2. Fake messages to steal sensitive info
- 4. Filters network traffic to block threats
- 8. Granting access to resources
- 9. Scrambling data to keep it secure
- 10. Secures internet connection privately
- 12. Detects and removes malicious software
- 13. Secretly monitors user activity
