Cyber Crossword

1234567891011121314151617
Across
  1. 2. Authentication based on unique physical or behavioural characteristics.
  2. 4. The point at which a device connects to a network, vulnerable to cyber threats.
  3. 6. Weaknesses in a system that can be exploited.
  4. 8. Software designed to harm or exploit computer systems.
  5. 9. Malicious software that encrypts files and demands payment for their release.
  6. 11. Updating software to fix vulnerabilities and improve security.
  7. 14. (8,8) A structured approach to address and manage the aftermath of a cyber incident.
  8. 15. Protects data by converting it into a secret code.
  9. 16. Acts as a barrier to prevent unauthorised access.
  10. 17. A secret word or code needed to gain access.
Down
  1. 1. (6,11)Manipulating individuals to divulge confidential information.
  2. 3. Exploits unknown vulnerabilities, posing a high risk.
  3. 5. Deceptive attempts to acquire sensitive information via email.
  4. 7. Verifying the identity of a user.
  5. 10. Enhanced security requiring authentication through two distinct methods.
  6. 11. The boundary or border of a network, often protected by firewalls.
  7. 12. (5,3) Ethical hackers who use their skills to help organisations improve security.
  8. 13. Unauthorised access or breach into system.