Across
- 6. network protection barrier
- 7. coding data for security
- 10. malware that demands payment
Down
- 1. software that secretly collects data
- 2. harmful software
- 3. network of infected devices
- 4. breaking into a computer system
- 5. malicious program disguised as legitimate
- 8. online fraud to steal personal information
- 9. unauthorized access to data
