Identifying and preventing vulnerabilities (J277)

123456789101112
Across
  1. 2. Creating copies of data to restore in case of loss.
  2. 5. Verifying the identity of a user or device.
  3. 7. Securing hardware and premises from unauthorised access.
  4. 8. A network security system that monitors and controls incoming and outgoing network traffic.
  5. 9. Restricting what users can view or modify within a system.
  6. 10. Converting data into a code to prevent unauthorised access.
  7. 11. Secret words or phrases used to authenticate users.
  8. 12. Firewalls perform this function to control network traffic.
Down
  1. 1. A software update designed to fix bugs or vulnerabilities.
  2. 3. A simulated cyberattack against a system to find vulnerabilities.
  3. 4. Regularly applying patches to software to fix vulnerabilities.
  4. 5. Software designed to detect and remove malicious programs.
  5. 6. Using unique biological characteristics for authentication.