Across
- 5. unaware software vulnerability attacked
- 7. computer damaging, harmful software
- 9. website shutdown using multiple devices
- 14. security during initial production stages
- 15. seemingly harmless but malicious malware
- 16. locks computer until random paid
- 17. scrambling data method
- 18. slows computer with unwanted ads
- 19. required identification changing system settings
- 20. Online repeated harassment
Down
- 1. implements security for computer system
- 2. access blocked for unauthorized users
- 3. click hidden element, opening malware
- 4. work policy for personal device
- 6. misleading edited picture or video
- 8. program designed to remove malware
- 10. compromised system infecting other systems
- 11. service for remotely connected wifi
- 12. the guarding against unauthorized access
- 13. personal information stealing tactic