Cybersecurity Crossword Puzzle

123456
Across
  1. 2. Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
  2. 4. Type of software that secretly gathers information from a user's computer without their consent.
  3. 5. Simulated attack on a system to test its security defenses, often referred to as "pen testing."
  4. 6. Network security device that monitors and filters incoming and outgoing traffic based on predefined rules.
Down
  1. 1. Process of converting information into a secret code to prevent unauthorized access.
  2. 3. Software vulnerability unknown to the software maker, leaving it open for attack until patched.
  3. 5. Deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity, often through email.