computer system security puzzle

12345678910111213
Across
  1. 3. __________ is a form of impersonation.
  2. 6. ___________ is a network protocol analysis tool.
  3. 7. Code Red is a type of ___________.
  4. 9. ________ is a type of software designed to help the user's computer detect viruses and avoid them.
  5. 11. _______ is a type of antivirus program.
  6. 12. Keyloggers are a form of _________.
  7. 13. Lack of access control policy is a _______.
Down
  1. 1. Aircrack-ng is used for ___________ attack.
  2. 2. A modification is done by only authorized user.
  3. 4. __________ is a popular tool used for discovering networks as well as in security auditing.
  4. 5. _____ is independent malicious program that need not any host program.
  5. 8. _________ is considered as the unsolicited commercial email.
  6. 10. Compromising confidential information comes under ________.
  7. 11. A software referred to as Malicious.