Cybersecurity puzzle

1234567
Across
  1. 2. – A secret string used to authenticate a user’s identity.
  2. 4. – The process of converting data into a secure code to prevent unauthorized access.
  3. 6. – A form of social engineering that tricks people into revealing sensitive data.
  4. 7. – General term for software designed to disrupt or damage a system.
Down
  1. 1. – A network security device that monitors and filters incoming and outgoing traffic.
  2. 2. – A set of rules used to transmit data securely over a network.
  3. 3. – A program designed to detect and destroy malicious software.
  4. 5. – Software that secretly gathers user information without consent.