Across
- 1. email attack
- 3. Digital information
- 4. Annoying spam
- 7. Monitors and controls traffic
- 9. An extra layer of protection
- 12. Prevents and fixes
- 13. Hidden malicious software
- 14. Hides your location
- 15. Self replicating
Down
- 2. Protecting a network
- 5. Collecting data
- 6. Harmful infections
- 8. Storage stored somewhere else
- 10. Converting data into code
- 11. Could be good or bad
