Across
- 3. Targeted high-profile phishing attack
- 7. Manipulating people for information
- 9. Unauthorized system intruder
- 11. Malware demanding payment
- 12. Software that spies
- 14. Malware disguised as legitimate
- 17. Faking identity
- 18. Malicious software
- 19. Software to detect malware
- 20. Self-replicating malware
Down
- 1. Records keystrokes secretly
- 2. Data Protection technique
- 4. Secret code
- 5. Network security system
- 6. Fingerprint or facial recognition
- 8. Fraudulent email scam
- 10. Unknown software vulnerability
- 13. Taking advantage of vulnerability
- 15. Secure network connection
- 16. Hidden access method
