Puzzle - 4

123456789
Across
  1. 2. used by attackers to gain access to a computer or a network.
  2. 3. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. 7. when someone uses a social network to create an account with a fake identity to deceit a concrete person.
  4. 8. Security as a Service
  5. 9. A combination of the words "robot" and "network"
Down
  1. 1. a type of malware that is aimed to infect and harm a file, a system or a network
  2. 4. A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  3. 5. S/w that automatically displays / downloads material when user is offline
  4. 6. a malicious code that is designed to harm computers and systems.
  5. 9. an error, flaw, failure or fault in a computer program or system that causes an unintended code interaction