Across
- 1. Attack traffic to take servers down
- 4. scrambles data for protection
- 8. network of infected computers
- 10. manipulating into confidential info
- 13. hides malware
- 14. records keynotes
- 15. hides IP
- 17. identity check
- 19. stealing data from emails
Down
- 2. watches and sends information to others
- 3. malware disguised as program
- 5. fix for volnurability
- 6. attack targeting vulnerabilities of software
- 7. blocks unauthorized access
- 9. knowledge about cyber threats
- 11. hacking to find flaws
- 12. providing identity
- 16. tries everything to gain access
- 18. locks data until paid for
