Unit 3 Cyber Security
Across
- 2. Level of assurance that the data will be available to those who need it when they want it
- 4. Countries have always spied on each other
- 7. Gaining the trust of individuals and using that trust to influence them to give confidential information
- 8. Rules which restrict access only to those who need to know
- 9. Level of assurance which can be given as to the accuracy and trustworthiness of the data
- 10. Sending so much traffic to a computer system that it cannot cope, denying access to legitimate users
- 11. Devices or programs that detect attempts at intrusion and take action to prevent them
- 13. Normally criminal activities because the intention is to cause harm to the computer or system
Down
- 1. To see how the system copes when subjected to conditions which would cause the vulnerabilities to become apparent
- 3. Exposes any attempts by attackers to overcome security controls to compromise data or other resources
- 5. This includes cyber enabled crime and cyber dependent crime.
- 6. Any threat which is a result of a natural event
- 12. Any threat to the system or computer through physical access. These include loss or theft of equipment. E.g. tablet or laptop, portable memory