Puzzle - 1

12345678910
Across
  1. 2. used by attackers to gain access to a computer or a network.
  2. 3. The core of a computer's operating system that houses the most essential functions of the computer
  3. 4. S/w that automatically displays / downloads material when user is offline
  4. 6. the process of verifying the identity of a user or piece of information and the veracity of information provided.
  5. 8. Completely Automated Public Turing test to tell Computers and Humans Apart
  6. 9. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
  1. 1. A segment of data by an Internet server to the browser that is returned to the browser everytime it accesses the server
  2. 5. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  3. 7. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
  4. 10. an error, flaw, failure or fault in a computer program or system that causes an unintended code interaction