Cybersecurity
Across
- 2. Fraudulent messages sent to trick users into revealing sensitive information
- 4. Unintentional user actions that cause data loss or damage
- 6. Granting permissions to a user based on their role
- 7. Restricting who can view or use resources in a system
- 8. Software designed to damage or gain unauthorised access to a system
- 9. A copy of data stored to prevent loss in case of system failure
- 10. Verifying a user’s identity before granting access
- 12. Malware disguised as legitimate software to trick users
Down
- 1. A security system that monitors and controls incoming and outgoing network traffic
- 3. Deliberate actions aimed at harming IT systems or stealing data
- 5. Malware that encrypts files and demands payment to restore access
- 11. A malware that attaches to files or programs and spreads when shared