1

123456789
Across
  1. 2. Safeguarding against unauthorized access
  2. 3. Network of compromised computers
  3. 4. Barrier against unwanted network traffic
  4. 6. Encoding data for secure transmission
  5. 8. Potential danger to system integrity
Down
  1. 1. Clear insight into system operations
  2. 2. Malicious software for covert surveillance
  3. 5. Interconnected system of devices and servers
  4. 7. Remote storage and computing infrastructure
  5. 9. Confirming identity for access