Cybersecurity crossword puzzle

123456789
Across
  1. 4. A system that verifies a user's identity through a unique physical characteristic.
  2. 6. A sequence of characters used to authenticate identity or access.
  3. 7. An encrypted connection between a web browser and a server.
  4. 8. An organization that identifies security flaws in software.
  5. 9. A type of attack that floods a network to disrupt its operation.
Down
  1. 1. Software used to protect against viruses and malware.
  2. 2. A technique to deceive individuals into providing sensitive information.
  3. 3. A program that replicates itself and spreads to other computers.
  4. 5. A secret code that only authorized parties should be able to read.
  5. 6. The practice of keeping software up to date to protect against vulnerabilities.