Puzzle - 3

123456789
Across
  1. 3. The core of a computer's operating system that houses the most essential functions of the computer
  2. 4. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
  3. 7. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
  4. 8. a type of malware that is aimed to infect and harm a file, a system or a network
  5. 9. a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
Down
  1. 1. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. 2. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
  3. 5. Customizable additions to software for extra functionality
  4. 6. string of characters used to verify the identity of an user during the authentication process
  5. 9. a program that can automatically perform some simple repeated task to reach a pursued goal.