Across
- 3. encrypts files, demands money
- 6. isolated environment for testing
- 8. attack common at cafes (abv)
- 11. an email scam
- 13. malicious digital system breach
- 15. fixes software security flaws
- 16. secure, digital ledger
- 17. taking advantage of vulnerabilities
- 18. network of infected computers
- 19. malware disguised as software
- 20. a common online currency
Down
- 1. self-replicating malware spreader
- 2. many strokes per minute
- 4. searching for vulnerabilities
- 5. the machine code
- 7. blue light
- 9. scurried optic
- 10. blocks unauthorized internet traffic
- 12. harmful software to systems
- 14. hidden access to system
- 16. be 'sus' of this hacker
