Cybersecurity Crossword Puzzle

123456789
Across
  1. 3. Applying updates to software to fix vulnerabilities
  2. 6. Process of verifying the identity of a user or device
  3. 9. Malicious software that locks data and demands payment for release.
Down
  1. 1. Manipulating people into revealing confidential information
  2. 2. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  3. 3. Secret string of characters used for authentication
  4. 4. Process of converting data into a coded form to prevent unauthorized access
  5. 5. Software designed to disrupt, damage, or gain unauthorized access to a system
  6. 7. Secure tunnel for online communication, often used for privacy
  7. 8. Network security system that monitors and controls incoming and outgoing traffic