Across
- 3. Hat Hackers Ethical computer experts
- 6. Account Control Restricts unauthorized access
- 9. Keys Used for secure communication
- 12. Awareness Training Teaches safe online behavior
- 13. Monitors and filters network traffic
- 14. Breaches unauthorized access to data
- 17. Attack Exploits unknown vulnerabilities
- 18. Scrambles data to protect it
- 20. Horse Malware disguised as a software
Down
- 1. Deceptive email scam
- 2. Malicious software
- 4. Online harassment
- 5. Software Protects against malware
- 7. Extorts computer users
- 8. Network of infected devices
- 10. Tricking users into clicking
- 11. Management Tools Password management helper
- 15. Secretly collects information
- 16. Secure remote connection
- 19. Wi-fi Networks Unsecured wireless networks