Paper 2
Across
- 3. Backup type that saves only changed files since the last full backup
- 5. Malicious software designed to damage or gain access to systems
- 7. The act of verifying a user’s identity
- 10. A simulated attack to test system defenses
- 12. Technique used to scramble data to prevent unauthorized access
- 13. Attack that overwhelms a system to make it unavailable
- 16. A social engineering attack that tricks users into giving up credentials
Down
- 1. The physical machines used in digital infrastructure
- 2. Used to simulate hardware environments for testing or development
- 4. Extra layer of login protection using a second device or code
- 6. type that saves only changed files since the last full backup
- 8. Technology that connects devices over short distances wirelessly
- 9. A self-replicating program that spreads without user action
- 11. Virtual or physical environment used for testing
- 14. A fake website designed to steal user data
- 15. Legislation protecting personal data in the UK