Across
- 3. Secure network connection
- 4. Harmful software
- 7. Unique human identifiers
- 9. Wireless network connection
- 13. Secure Socket Layer
- 15. Software update fix
- 18. Keystroke monitoring software
- 19. Data recovery copy
Down
- 1. Malicious data encryption
- 2. Network of compromised devices
- 3. Malicious software
- 5. Denial of Service attack
- 6. Engineering Manipulating users for access
- 8. Malicious software disguised
- 10. Intrusion Detection System
- 11. Secure data encoding
- 12. Deceptive email attacks
- 14. Unsolicited email messages
- 16. Unauthorized access seeker
- 17. Network security barrier