Across
- 2. Protection against malicious programs.
- 3. Malicious cyber attackers.
- 4. Data protection through cryptography.
- 9. Deceptive malicious software.
- 10. Network of compromised computers.
- 14. Deceptive online identity theft.
- 16. Covert information-gathering software.
- 18. Ethical cybersecurity professionals.
- 19. Attack Network flooding disruption technique.
- 20. Synthetic media manipulation technique.
Down
- 1. Security breach exposes data.
- 5. Tools Software for secure password storage.
- 6. Secret codes for data protection.
- 7. Harmful computer software.
- 8. Unpatched software vulnerability exploitation.
- 11. Network traffic filtering safeguard.
- 12. Deceptive click manipulation technique.
- 13. Online harassment and intimidation.
- 15. Secure remote network access.
- 17. Files held hostage for payment.