Across
- 1. A virtual private network to access remote services securely
- 3. A cyber attack that floods a network or server with excessive traffic to make it unavailable.
- 6. A digital or physical device used to authenticate a user, often as a second factor.
- 7. A hidden way into a system that bypasses normal authentication.
- 9. Fake security alerts that trick users into installing malware or paying money.
- 11. The practice of accessing a computer network illegally.
- 12. A program that performs automated tasks, and can be controlled remotely and malicious
Down
- 2. A secret combination of characters used to verify a user’s identity.
- 4. A targeted form of phishing
- 5. A security model that assumes no user or system is inherently trusted.
- 8. Self-replicating malware that spreads across networks without user action.
- 10. The practice of protecting computers, networks, and data from digital attacks or unauthorised access.
