Security Terminology Puzzle (Participation 3)

1234567891011121314151617181920
Across
  1. 2. compromised computers used for cyberattacks
  2. 6. numbers identifying a internet connected device
  3. 9. personal devices in work space
  4. 10. network pro learning hacking techniques
  5. 11. tricking users to click an image
  6. 12. sensitive information thats unreadable
  7. 13. malware that makes you pay
  8. 14. software that is harmful
  9. 17. shield for data
  10. 18. software that checks for malware
  11. 19. A network that encrypts data
  12. 20. malware pretending to be useful
Down
  1. 1. cyber attacks accessing sensitive information
  2. 3. lots of attackers preventing legitimate users
  3. 4. attacks seeking out personal info
  4. 5. software that tracks you
  5. 7. malware that displays adverts
  6. 8. Training to prevent cyber threats
  7. 15. cybercriminals exploiting unauthorized access to computers
  8. 16. internet access at Starbucks