Puzzle - 1

123456789
Across
  1. 3. used by attackers to gain access to a computer or a network.
  2. 5. S/w that automatically displays / downloads material when user is offline
  3. 6. a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, etc. through the system, except those explicitly mentioned which are denied access.
  4. 8. the process of verifying the identity of a user or piece of information and the veracity of information provided.
  5. 9. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
Down
  1. 1. A segment of data by an Internet server to the browser that is returned to the browser everytime it accesses the server
  2. 2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. 3. Badguys in the world of cybercrime. Hackers with criminal intentions
  4. 4. Completely Automated Public Turing test to tell Computers and Humans Apart
  5. 7. The core of a computer's operating system that houses the most essential functions of the computer