Cyber security

123456789
Across
  1. 4. Exposes any attempts by attackers to overcome security controls.
  2. 5. Natural disasters such as floods.
  3. 6. Countries always spy on each other.
  4. 7. The level of assurance that the data will be available to those who need it when they want it.
  5. 8. A person who uses existing codes to hack into computers.
  6. 9. The real name of our cyber security teacher.
Down
  1. 1. A method that is used to test the security of software.
  2. 2. Access must be restricted to those authorised to view the data in question.
  3. 3. An individual who gains unauthorised access to a computer system or network.
  4. 4. The level of assurance as to the accuracy and trustworthiness of the data.
  5. 7. Software designed to prevent, detect and eradicate malicious software.