Across
- 3. Insurance against data loss
- 5. Malware pretending to be a program
- 6. Software designed to detect malware
- 8. A network of infected computers
- 9. Something that makes us safe
- 12. Data exposed or stolen by attackers
- 13. An individual responsible for launching cyberattacks
- 15. Electronic equipment no longer used
- 17. Bullying someone online
- 18. Scam email or message
- 19. How to open a password-protected device
Down
- 1. Harmful software that enters a device
- 2. Sell knowledge of hardware to attackers
- 4. Where you store passwords
- 7. Committing identity or financial fraud
- 8. When body parts used for authentication
- 10. Ensures person accessing software is authentic
- 11. Hardware used to keep intruders out
- 14. A lock on data for protection
- 16. Program designed to copy itself
