Safe Computing

123456789101112131415161718192021
Across
  1. 5. Locks data for ransom
  2. 6. Hidden malicious web clicks
  3. 9. containing suspicious files in isolation
  4. 15. Hidden data in files
  5. 18. Fixes security vulnerabilities
  6. 19. Scrambles data for security
  7. 21. Fake system traps hackers
Down
  1. 1. Block unauthorized network
  2. 2. records keyboard keystrokes
  3. 3. Secure encrypted online tunnel
  4. 4. Damage to system becomes unusable
  5. 7. Unauthorized data transfer
  6. 8. Malicious software program
  7. 10. Secret system access method
  8. 11. Fake emails to trick victim
  9. 12. Secretly monitors user activity
  10. 13. Self-spreading malicious code
  11. 14. Network of infected devices
  12. 16. Displays unwanted pop ads
  13. 17. Converts data into digest
  14. 20. Disguised program carrying hidden threat