Across
- 2. A flaw hackers use before it’s fixed
- 5. Malware disguised as safe software
- 6. A group of infected devices controlled by a hacker
- 7. Software that shows unwanted ads
- 8. Software that records what you type
- 9. Proving your identity to access something
- 10. Rules that decide who can use or view something
Down
- 1. A system that blocks unwanted access to a network
- 3. Fake messages used to trick people into giving personal info
- 4. Harmful software designed to
- 6. Guessing passwords over and over until one works
- 11. Unwanted or junk messages
