Across
- 3. Hint: Mends security holes.
- 5. Hint: Blocks unauthorized access.
- 6. Hint: Digital fingerprint.
- 8. Hint: Protects data in transit.
- 10. Hint: Dock for data transfer.
- 13. Hint: Concealing information using codes.
- 16. Hint: Echo request.
- 18. Hint: Padlock for websites.
- 19. Hint: Sounds like a sharp inhale.
- 20. Hint: Base of a tree.
Down
- 1. Hint: Neutral ground.
- 2. Hint: Inbox clutter.
- 4. Hint: Crawling through networks.
- 7. Hint: Cyber mischief.
- 9. Hint: Shields your identity.
- 11. Hint: Infectious code.
- 12. Hint: Minor glitch.
- 14. Hint: Sounds like a fishing technique.
- 15. Hint: Private internet highway.
- 17. Hint: Automated program.