Across
- 4. Malicious software disguise
- 5. Data unscrambling process
- 7. Malicious software infection
- 8. Identity verification process
- 12. Access security code
- 13. Malicious software programs
- 16. Internal threat actors
- 18. Data hostage software
- 19. Website tracking data
- 20. Deceptive online attacks
Down
- 1. Online terrorism actors
- 2. Activist hackers
- 3. Data protection method
- 6. Personal information protection
- 9. Electronic waste disposal
- 10. Online harassment
- 11. Self-replicating malware program
- 14. Wireless internet connection
- 15. Persistent online harassment
- 17. Unsolicited email messages