Cyber Security
Across
- 4. An unauthorised user who attempts to or gain access to a network
- 6. A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
- 8. Securing your online accounts with an extra layer of protection is called ____________________ authentication
- 9. Computer programs that can block, detect, and remove viruses and other malware
Down
- 1. A mechanism to create a secure connection between a computer and the network
- 2. The unauthorised disclosure or unwanted exposure of confidential information
- 3. The protection of digital information, as well as the integrity of the infrastructure
- 5. Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
- 7. Faking the sender’s email address to gain access to a secure network