BTEC DIT C3B - Cyber Security

1234567891011
Across
  1. 3. A method of authentication that uses parts of the body for identification
  2. 6. Malware that encrypts a computer system until a fee is paid
  3. 8. A reason for attacking a system purely to cause downtime
  4. 10. When a user is directed to a phoney/spoof website where their personal details will be collected
  5. 11. The act of tricking a person to voluntarily giving personal details / money
Down
  1. 1. When a security system has been attacked/compromised
  2. 2. Prevents unwanted internet traffic from entering a digital system or network
  3. 4. Spying on other companies
  4. 5. Device ______________ : a range of measures to make a system less vulnerable to attack
  5. 7. A threat coming from outside an organisation
  6. 9. A threat coming from inside an organisation