cybersecurity crossword puzzle

1234567891011121314151617181920
Across
  1. 2. authentication two-step identity verification
  2. 4. exploits unknown software vulnerability
  3. 8. verifies user identity
  4. 9. secretly monitors user activity
  5. 10. hides malicious activities
  6. 12. engineering manipulates people for information
  7. 13. fixes software vulnerabilities
  8. 16. force attack tries all password combinations
  9. 18. self-replicating malicious program
  10. 19. horse disguised malicious software
  11. 20. blocks unauthorized network access
Down
  1. 1. hidden access to systems
  2. 3. spreads copies across networks
  3. 5. converts data into code
  4. 6. encrypts data, demands ransom
  5. 7. testing simulates attacks to find vulnerabilities
  6. 11. fraudulent attempt to obtain information
  7. 14. network of infected devices
  8. 15. malicious software causing harm
  9. 17. overwhelms service with traffic