Across
- 2. Authentication based on unique physical or behavioural characteristics.
- 4. The point at which a device connects to a network, vulnerable to cyber threats.
- 6. Weaknesses in a system that can be exploited.
- 8. Software designed to harm or exploit computer systems.
- 9. Malicious software that encrypts files and demands payment for their release.
- 11. Updating software to fix vulnerabilities and improve security.
- 14. (8,8) A structured approach to address and manage the aftermath of a cyber incident.
- 15. Protects data by converting it into a secret code.
- 16. Acts as a barrier to prevent unauthorised access.
- 17. A secret word or code needed to gain access.
Down
- 1. (6,11)Manipulating individuals to divulge confidential information.
- 3. Exploits unknown vulnerabilities, posing a high risk.
- 5. Deceptive attempts to acquire sensitive information via email.
- 7. Verifying the identity of a user.
- 10. Enhanced security requiring authentication through two distinct methods.
- 11. The boundary or border of a network, often protected by firewalls.
- 12. (5,3) Ethical hackers who use their skills to help organisations improve security.
- 13. Unauthorised access or breach into system.
