Cyber Awareness

123456789101112
Across
  1. 1. A virtual private network to access remote services securely
  2. 3. A cyber attack that floods a network or server with excessive traffic to make it unavailable.
  3. 6. A digital or physical device used to authenticate a user, often as a second factor.
  4. 7. A hidden way into a system that bypasses normal authentication.
  5. 9. Fake security alerts that trick users into installing malware or paying money.
  6. 11. The practice of accessing a computer network illegally.
  7. 12. A program that performs automated tasks, and can be controlled remotely and malicious
Down
  1. 2. A secret combination of characters used to verify a user’s identity.
  2. 4. A targeted form of phishing
  3. 5. A security model that assumes no user or system is inherently trusted.
  4. 8. Self-replicating malware that spreads across networks without user action.
  5. 10. The practice of protecting computers, networks, and data from digital attacks or unauthorised access.