demo

123456789
Across
  1. 4. who tests systems for security vulnerabilities, often ethically. (9 letters) A type of encryption where the same key is used for both encryption and decryption. (10 letters)
  2. 5. of ensuring only authorized users can access systems or data. (6 letters)
  3. 6. of rules for managing and securing networks and information systems. (7 letters)
  4. 9. of attack where attackers gain unauthorized access by pretending to be a trustworthy entity. (6 letters)
Down
  1. 1. designed to detect and remove viruses and other malicious software. (8 letters)
  2. 2. of malicious software that replicates itself and spreads to other computers. (7 letters)
  3. 3. of converting data into a code to prevent unauthorized access. (10 letters)
  4. 7. of attack where sensitive information is stolen by intercepting communication. (11 letters)
  5. 8. where a hacker floods a network with excessive data to overwhelm it. (3 letters)