Puzzle - 12

1234567891011
Across
  1. 1. State of being safe / free from danger or threat
  2. 5. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
  3. 6. A person or event that has the potential for impacting a valuable resource in a negative manner
  4. 8. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
  5. 10. The programs and other operating information used by a computer
  6. 11. is an attack attempt by an unauthorized entity or attacker to gain illegitimate access to a system by posing as an authorized user.
Down
  1. 2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. 3. Good guys in the world of cybercrime. Hackers who use their skills and talents for good
  3. 4. extends a private network across a public network and enables users to send and receive data across shared or public networks
  4. 7. a list of permitted items that are automatically let through whatever gate is being used.
  5. 9. name commonly given to unsolicited email.