Cybersecurity Terminology Puzzle

1234567891011121314151617181920
Across
  1. 3. Targeted high-profile phishing attack
  2. 7. Manipulating people for information
  3. 9. Unauthorized system intruder
  4. 11. Malware demanding payment
  5. 12. Software that spies
  6. 14. Malware disguised as legitimate
  7. 17. Faking identity
  8. 18. Malicious software
  9. 19. Software to detect malware
  10. 20. Self-replicating malware
Down
  1. 1. Records keystrokes secretly
  2. 2. Data Protection technique
  3. 4. Secret code
  4. 5. Network security system
  5. 6. Fingerprint or facial recognition
  6. 8. Fraudulent email scam
  7. 10. Unknown software vulnerability
  8. 13. Taking advantage of vulnerability
  9. 15. Secure network connection
  10. 16. Hidden access method