Cyber Security
Across
- 3. The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- 5. A cyber attack intended to redirect a website's traffic to another, fake site.
- 6. A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- 7. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- 1. Observing a person's private information over their shoulder eg cashpoint machine PINs.
- 2. A computer program or system intended to distinguish human from machine input
- 4. A form of identification and authentication which relies on comparing scans of e.g. your face