Cybersecurity Puzzle!

123456789
Across
  1. 3. Unauthorized access to or manipulation of computer systems.
  2. 5. A program that protects your computer from viruses
  3. 8. A network security device that monitors and controls incoming and outgoing traffic.
  4. 9. A process used to confirm the identity of a user.
Down
  1. 1. A method of stealing personal information by pretending to be a trustworthy source.
  2. 2. A type of software designed to harm or exploit systems
  3. 4. A weak point in a system that can be exploited.
  4. 6. A secret code used to secure data.
  5. 7. A person who attempts to gain unauthorized access to networks.