Cyber Security Puzzle
Across
- 3. Extra copies of computer files that can be used to restore files that are lost or damaged.
- 4. Attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources.
- 6. An unauthorized user who attempts to or gains access to an information system.
- 8. Software designed to block malware from entering protected networks.
- 9. A mechanism for creating a secure connection between a computing device and a computer network.
- 10. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
Down
- 1. A string of characters used to authenticate and identity.
- 2. A flaw or weakness in an information system that could be exploited.
- 5. part of internet that is not indexed by search engines.
- 7. A computer program that can block, detect and remove viruses and other malware.