Across
- 7. - Fake messages used to trick people into giving information
- 8. - Protection of computer networks from threats
- 9. - A malicious program that spreads by attaching to files
- 11. - Software designed to harm or exploit a computer system
- 13. - Malware that hides deep in a system to avoid detection
- 14. - Malware that spreads across networks without user action
- 15. - A secret word used to access accounts
Down
- 1. - The process of converting data into a secure code
- 2. - Software that secretly tracks user activity
- 3. - A system that blocks unauthorized access to a network
- 4. - Software that detects and removes malware
- 5. - Malware that locks files and demands payment
- 6. - The trail of data you leave online
- 10. - A person who gains unauthorized access to systems
- 12. - A login method requiring two forms of verification
