Across
- 2. Lots of attackers preventing users
- 6. Tricking users to click an image
- 7. Malware disguised as normal software
- 8. Public internet access
- 11. Malware that tracks you
- 13. Bring your own device
- 14. Attack seeking out personal info
- 16. Malware that makes you pay
- 17. Attack that exploits unknown vulnerability
- 18. Making data unreadable by scrambling
- 19. Shield for data
- 20. Network pro learning hacking techniques
Down
- 1. Malicious hackers
- 3. Security keeping internet users safe
- 4. Software that is harmful
- 5. Software that checks for malware
- 9. Malware that displays ads
- 10. Media altered realistically
- 12. Virtual private network
- 15. Unauthorized access to sensitive info