Cybersecurity crossword puzzle

12345678910
Across
  1. 3. A technique to deceive individuals into providing sensitive information.
  2. 5. Software used to protect against viruses and malware.
  3. 7. A sequence of characters used to authenticate identity or access.
  4. 9. A program that replicates itself and spreads to other computers.
  5. 10. An encrypted connection between a web browser and a server.
Down
  1. 1. The practice of keeping software up to date to protect against vulnerabilities.
  2. 2. A system that verifies a user's identity through a unique physical characteristic.
  3. 4. A secret code that only authorized parties should be able to read.
  4. 6. A type of attack that floods a network to disrupt its operation.
  5. 8. An organization that identifies security flaws in software.