Cybersecurity Puzzle

1234567891011121314151617181920
Across
  1. 2. Self-replicating malicious software
  2. 3. Fixes security vulnerabilities
  3. 5. Acts as an intermediary server
  4. 6. Fake emails to steal info
  5. 7. Attack using trial and error
  6. 9. Program that spreads and harms
  7. 11. Remote storage and computing
  8. 13. Harmful software for attacks
  9. 14. Access to an account or system
  10. 15. Device used for entering codes
  11. 18. Payment demanded for files
  12. 20. Secretly monitors user activity
Down
  1. 1. Superuser access level
  2. 4. Method for encrypting information
  3. 8. Disguised harmful software
  4. 10. Protection against cyber threats
  5. 12. Secret entry point for attacks
  6. 16. Permission to use a system
  7. 17. Unauthorized access to systems
  8. 19. Encrypts data for protection