Super Secret Security Crossword Puzzle

123456789
Across
  1. 2. itelligence exhibited by machines, particularly computer systems.
  2. 3. one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
  3. 6. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  4. 7. "gift" or "present" in Arabic.
  5. 8. a team of experts that proactively monitor and respond to cybersecurity incidents.
  6. 9. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
  1. 1. the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
  2. 4. an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
  3. 5. a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
  4. 7. a technique through which a cybercriminal disguises themselves as a known or trusted source.