Across
- 4. Secure connection for private browsing
- 7. Hostage-taking malware for files
- 9. Vulnerability before the fix
- 10. Identity verification for access
- 11. Computer virus and harmful software
- 13. Guard against harmful computer viruses
- 15. Protecting digital systems and data
- 18. Monitor for malicious activities
- 19. Deceptive emails for sensitive data
Down
- 1. Deliberate act to disrupt systems
- 2. Malicious software's harmful action
- 3. Secretly records keystrokes for theft
- 4. System's exploitable weak point
- 5. Network traffic gatekeeper and monitor
- 6. Secret entry to bypass security
- 8. Impersonation for unauthorized access
- 12. Secure data with secret code
- 14. Authorized entities' access list
- 16. Flood of traffic to disrupt
- 17. Software update to fix vulnerabilities