Across
- 1. The front line of defense in information security needed for accessing resources in a computer system
- 4. A copy of the information held on a device (such as photos and documents) which is stored somewhere else
- 5. A ____ breach is when a hacker successfully breaks into a system and exposes private information
- 6. A message that tries to trick you into doing something that could cause you harm, such as giving away information or clicking a link
- 7. A location on the internet where you can save your data securely(rather than on your computer or device)
- 8. A mechanism for creating a secure connection between a computing device & a computer network
Down
- 1. Information about you held on computers that you wouldn’t want others (especially hackers) to get hold of
- 2. If you receive a suspicious ____, hover over it with your mouse before clicking to make sure it is real
- 3. Which act outlines the consent, purpose limitation & accountability in the processing of digital personal data
- 6. A replacement for passwords that provides more secure sign-ins to websites and apps across a user's device
