Cyber Security Cross Word

123456789
Across
  1. 3. Scrambling data so only the right person can read it (10 letters)
  2. 8. Blocks unwanted access to or from a network (8 letters)
  3. 9. A weakness in a system a threat actor can take advantage of (13 letters)
Down
  1. 1. Tool used to hide your internet activity (3 letters)
  2. 2. A formal set of rules or guidelines for maintaining security (6 letters)
  3. 4. Fake emails that trick you into giving personal info (9 letters)
  4. 5. Software that blocks computer viruses (9 letters)
  5. 6. A term for harmful software (7 letters)
  6. 7. A type of malware that can be attached to a legitimate file. (5 letters)