Cyber Security Month 2023
Across
- 3. Processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 6. The ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans
- 9. An important process that verifies a user is really who they are; many was this can be done
- 10. An example would be an email from a Nigerian prince asking you for your personal details including bank details to you can receive millions of dollars
- 11. An attack that hijacks your system and denies you access until you send money
- 12. Characteristics used to identify a person
- 13. The form of encryption that requires two different credentials
- 14. Malware hidden as an attachment or free download
Down
- 1. The state of being free from danger for threat
- 2. Bullying that takes place online
- 4. Type of cyber attack where a person is tricked into give information via a text message
- 5. Digital currency, preference for hackers
- 7. A person who tries to gain unauthorised access to a network or computer system.
- 8. When a hacker successfully exploits a device and gains access to files and data
- 15. An annoying malware that spams you with ads
- 16. A fraudulent or deceptive act or operation