Ethical hacking cross word puzzle

123456789101112131415
Across
  1. 7. Extracting detailed information from a target
  2. 8. Malicious code that replicates itself
  3. 9. Person who finds and exploits system vulnerabilities
  4. 10. Security barrier between network and internet
  5. 13. Gathering information about a target system
  6. 15. Manipulating people to reveal confidential info
Down
  1. 1. Code or method used to take advantage of a vulnerability
  2. 2. Software designed to harm or exploit systems
  3. 3. Weakness that can be exploited
  4. 4. Fake emails used to steal information
  5. 5. Process of converting data into unreadable code
  6. 6. Software that secretly monitors user activity
  7. 11. Identifying active hosts and open ports
  8. 12. Attack that makes a system unavailable
  9. 14. Self-replicating malware spreading through networks