Across
- 3. Malware that hides in a system
- 6. Harmful computer software
- 8. Software that secretly collects information
- 10. Two step login security
- 12. Trick to steal personal information
- 13. Verifying identity
- 14. Person who breaks into systems
Down
- 1. Malware that spreads through networks
- 2. Safe behavior online
- 4. Malware that attaches to files
- 5. Secret word to log in
- 7. Protecting computer networks
- 9. Malware that locks files for money
- 11. Blocks unauthorized network access
- 15. Coding data to keep it safe
