Module 9 Participation | Cybersecurity Crossword Puzzle

12345678910111213141516171819
Across
  1. 2. - Tracks and monitors user behavior
  2. 4. - Group of infected computers
  3. 7. - Malware disguised as legitimate software
  4. 10. - Verifies website's online authenticity
  5. 12. - Fraudulent emails seeking information
  6. 13. - Overloads servers with excessive traffic
  7. 14. - Displays unwanted advertisements
  8. 16. - Software designed to harm systems
  9. 18. - Blocks unauthorized network access
  10. 19. - Tracks every keystroke entered
Down
  1. 1. - Hides malicious software presence
  2. 3. - Secures data with coding
  3. 5. - Encrypts online data and browsing
  4. 6. - Gains unauthorized computer access
  5. 8. - Unauthorized access to data
  6. 9. - Locks data until payment made
  7. 11. - Secretly gathers user information
  8. 14. - Scans and removes harmful software
  9. 15. - Fixes system vulnerabilities
  10. 17. - Self-replicates to spread infection