2.4/2.5

123456789101112
Across
  1. 6. The greatest security threat to individuals or organisations. Often dangerous due to BYOD.
  2. 7. Hoax websites can be created to steal information from an individual. Cookies also used to track activity.
  3. 9. Information such as bank details or card details which could be stolen from an individual, organisation or the state.
  4. 11. An organisations patents or designs which they would not want to be stolen.
  5. 12. Funny videos from the past may have been funny back then but could jeopardize someones career prospects if found by employers.
Down
  1. 1. An attack where a server is overloaded with requests and so refuses to process your request and you don't get the information. Typically a threat to organisations or websites.
  2. 2. One of the most valuable things in the world, capable of providing great wealth or power to anyone who possesses it.
  3. 3. Data can be stolen from Individuals, Organisations or The ____.
  4. 4. Pieces of information that would allow a hacker to know information about an individuals name and address.
  5. 5. Organisations could become vulnerable to _____ if information is stolen by someone who wants to gain leverage over the organisation.
  6. 8. What could an organisation lose if they are a victim of a cyber attack. Customers may not trust them anymore.
  7. 10. An organisations development plans may contain possible ____ with other organisations.