Across
- 3. a new way to hack
- 7. requires autorization for changes
- 9. personal protected network
- 10. multiple attackers prevent legitimate user
- 11. software designed to harm user
- 13. attacks seeking personal information
- 14. shield for data
- 15. scrambling data into unreadable
- 16. network pro learning hacking techniques
- 17. malware that displays adverts
- 18. media that creates a false image
- 19. internet access at starbucks
Down
- 1. malware that makes you pay
- 2. tricking users to click link
- 4. codes that keep encryptions safe
- 5. how odysseus would install malware
- 6. using infected computers to infect more
- 8. software that tracks without your knowledge
- 10. unwaranted access to sensitive information
- 12. software deigned to protect computers
