Across
- 4. A "tear" in the wall
- 8. Hidden code that steals
- 10. Alternative to the front
- 12. Should be easy to remember
- 15. Data inspection/what a blood hound is known for
- 16. Pretending to be someone you're not
- 17. A targeted attack
- 18. "The Borg" under control
- 19. A common cold
- 20. Disguised as a legitimate program
Down
- 1. Unauthorized domain registration
- 2. Holding "Brent Spiner" hostage
- 3. Need a key to open
- 5. Unwanted online material
- 6. Program that's intentionally harmful
- 7. Hacker way to shutdown a network
- 9. What you do with a hook, rod and reel
- 11. Don't write this on a notepad
- 13. Used by titans to catch fish
- 14. A "secret" scrambled code
