Ethical hacking

123456789
Across
  1. 3. Type of hacker who uses skills for good (9 letters)
  2. 8. A tool used to block unauthorized network access (8 letters)
  3. 9. Mathematical process to hide data (10 letters)
Down
  1. 1. Masquerading as a trustworthy entity to obtain information (8 letters)
  2. 2. Testing systems to find vulnerabilities (13 letters)
  3. 4. Program exploiting vulnerabilities for malicious purposes (7 letters)
  4. 5. A weakness in a system (12 letters)
  5. 6. Software that damages or disrupts systems (7 letters)
  6. 7. Verification of user identity (14 letters)