Cyber Defence
Across
- 4. Software designed to detect and remove threats
- 6. Person who gains unauthorized access to systems
- 7. Network barrier that filters traffic
- 10. Software that secretly monitors users
- 13. Process of turning encoded data back to normal
- 15. Network of compromised devices controlled remotely
- 17. Malware that locks files until payment is made
Down
- 1. Method of protecting data by encoding it
- 2. Copy of data for recovery
- 3. Authentication using fingerprints or face
- 5. Fake messages used to steal information
- 8. Temporary code used for authentication
- 9. Security using multiple verification methods
- 11. Update that fixes vulnerabilities
- 12. Tool used to hide malicious activity
- 14. Employee who misuses access to data
- 16. Secure connection over the internet