Across
- 2. - Tracks and monitors user behavior
- 4. - Group of infected computers
- 7. - Malware disguised as legitimate software
- 10. - Verifies website's online authenticity
- 12. - Fraudulent emails seeking information
- 13. - Overloads servers with excessive traffic
- 14. - Displays unwanted advertisements
- 16. - Software designed to harm systems
- 18. - Blocks unauthorized network access
- 19. - Tracks every keystroke entered
Down
- 1. - Hides malicious software presence
- 3. - Secures data with coding
- 5. - Encrypts online data and browsing
- 6. - Gains unauthorized computer access
- 8. - Unauthorized access to data
- 9. - Locks data until payment made
- 11. - Secretly gathers user information
- 14. - Scans and removes harmful software
- 15. - Fixes system vulnerabilities
- 17. - Self-replicates to spread infection
