Across
- 1. Prevents unauthorized axes.
- 5. Encrypts user data.
- 8. Malware disguised as legit files.
- 10. Provides services over the internet.
- 12. Scrambles data for security.
- 14. Dangerous and can bypass security.
- 15. A group of applications.
- 16. Series of computers and peripherals.
- 17. Waves of requests force shutdown.
- 18. Malware that collects and transmits.
- 20. Changes, corrupts, or destroys information.
Down
- 2. Protects data during encryption.
- 3. Shields users against viruses.
- 4. Hacker changes the IP address.
- 6. Malware that hijacks and encrypts.
- 7. Network of compromised computers.
- 9. Bad, evil software.
- 11. Fools victim into giving information.
- 13. A series of numbers.
- 19. Malware that reproduces and spreads.