Axel's Puzzle

12345678
Across
  1. 2. Software designed to damage or disrupt a computer system.
  2. 4. Process of converting information or data into a code to prevent unauthorized access.
  3. 5. Trying to get sensitive information like usernames, passwords, and credit card details by pretending to be someone trustworthy.
  4. 7. Secret word or phrase used for authentication and access control.
  5. 8. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
Down
  1. 1. Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
  2. 3. Software designed to detect and remove viruses and other malicious software.
  3. 6. Network security system designed to prevent unauthorized access
  4. 7. Update to fix vulnerabilities or improve functionality in software.