Principles of CyberSecurity

12345678910111213141516171819202122
Across
  1. 4. The process of saving data in case it is lost or damaged
  2. 7. The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
  3. 10. A type of virus that you think is one thing but is really another thing
  4. 11. The methods we employ to keep data safe
  5. 13. a security method where more than one way of determining identity is utilised
  6. 14. Gaining unauthorised access to a system
  7. 16. A scam method using email
  8. 18. A security method where data is put into a code
  9. 22. The law that says you can have access to any info kept about you
Down
  1. 1. When an Enterprise has experiences unauthorised access to their data
  2. 2. Is the data accurate, updated and from a reliable source
  3. 3. Software that locks your system and you need to pay a few for the code
  4. 5. The right to keep info about ourselves confidential
  5. 6. A scam method using SMS
  6. 8. Where one person pretends to be someone else using confidential information
  7. 9. landscape The environment in which a system exists and the risks involved in regard to security
  8. 12. A piece of software designed to block unauthorised access to a system
  9. 15. The hat colour of a "good" hacker
  10. 17. Software used to prevent malicious programs from damaging a system
  11. 19. damage A business may suffer this after a breach
  12. 20. Security systems that are based on a human feature
  13. 21. Software designed to damage a system