Cybersecurity Puzzle

12345
Across
  1. 2. A defensive technology designed to keep the bad guys out.
  2. 4. Technology that allows us to store and access files or services remotely via the internet.
  3. 5. A group of computers, printers and devices that are interconnected and governed as a whole.
Down
  1. 1. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  2. 3. A set of programs that tells computers how to perform a set of tasks.