Introduction to Cyber Security - Harjap Nahal

12345678910111213141516171819
Across
  1. 1. protects your data including employee and customer data
  2. 4. protecting data and the systems that store it from attacks
  3. 7. Operating information used by the computer
  4. 9. offer services to the client such as outsourced technology support
  5. 11. creates a copy of the data that can be recovered incase something happens
  6. 12. bring up to date, modernize
  7. 15. prevents phishing attacks from happening
  8. 16. unauthorized parties gaining access to confidential information
  9. 17. used to protect data from being stolen, changed, or compromised
  10. 19. an action of fraud
Down
  1. 2. the process of verifying a user or device before allowing access to a system or resources
  2. 3. a cyber attack where someone tricks other computers networks
  3. 5. to keep an eye on something
  4. 6. an attempt by hackers to damage or destroy a computer network or system
  5. 8. secure place to store online content
  6. 9. checking or proving something is true
  7. 10. something that protects and gives safety
  8. 13. tricking internet users into revealing their personal or private information
  9. 14. needed to get into something
  10. 18. encrypts data sent over by the internet to prevent hackers from seeing it