BTEC DIT C3B - Cyber Security
Across
- 3. A method of authentication that uses parts of the body for identification
- 6. Malware that encrypts a computer system until a fee is paid
- 8. A reason for attacking a system purely to cause downtime
- 10. When a user is directed to a phoney/spoof website where their personal details will be collected
- 11. The act of tricking a person to voluntarily giving personal details / money
Down
- 1. When a security system has been attacked/compromised
- 2. Prevents unwanted internet traffic from entering a digital system or network
- 4. Spying on other companies
- 5. Device ______________ : a range of measures to make a system less vulnerable to attack
- 7. A threat coming from outside an organisation
- 9. A threat coming from inside an organisation