June 12 - InfoSec
Across
- 2. Protecting systems and data from threats
- 5. Computer equipment which protects your network from hackers gaining remote access
- 7. Keeping personal information secure
- 9. What needs to be kept private and secure
- 13. Files that may contain sensitive information
- 15. Person who gains unauthorized access to a computer system
- 18. Program that deletes files and/or programs
- 19. Group of connected computers
- 20. Ensuring data remains unaltered and trustworthy
- 21. Permissions granted to view or use data/systems
- 26. Rules and policies governing cybersecurity practices
- 28. Digital information that needs safeguarding
- 29. Being alert to potential cybersecurity risks
Down
- 1. The protection of computers, networks and data from malware and hackers
- 3. Where a person lies to another to trick them into giving over money or information
- 4. Sending fake emails telling victims to log onto a fake website which steals their password and login details
- 6. Malware which gives a hacker admin powers to control your computer
- 8. Malware which completes small repetitive tasks (used in DDoS attacks)
- 10. Someone who might visit offices to teach workers about cybersecurity
- 11. Obligation to follow security best practices
- 12. Program which appears useful, but hides malicious software inside
- 13. Causing a website to crash by directing millions of computers to simultaneously request data from it (4 letter acronym)
- 14. Preventing unauthorized disclosure of information
- 16. A flaw in a program or network which makes it vulnerable to hacking
- 17. Potential danger that could breach security
- 22. Measures to limit access and maintain security
- 23. Plan to maintain cybersecurity defenses
- 24. Another name for a software engineer
- 25. String of letters, numbers and characters entered along with a user ID to log in
- 27. Umbrella term for various programs that cause problems, including viruses, ransomware and trojans