Crack the code

123456789101112
Across
  1. 5. A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
  2. 7. A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
  3. 9. A program designed to prevent, detect, and remove malware (10 letters)
  4. 10. The process of verifying the identity of a user or device (10 letters)
  5. 12. A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
Down
  1. 1. The exploitation of security vulnerabilities in a computer system or network (9 letters)
  2. 2. Protects a computer system from unauthorized access (9 letters)
  3. 3. Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
  4. 4. The practice of disguising malicious files to make them appear harmless (7 letters)
  5. 6. A set of rules or guidelines designed to enhance computer security (9 letters)
  6. 8. A type of attack where an attacker intercepts communication between two parties (6 letters)
  7. 11. The unauthorized copying of data from a computer system (6 letters)