Across
- 3. Malware that attempts to extort money by locking files
- 6. A weakness that may be exploited by a threat actor
- 8. Software that protects your device from malware
- 9. Cyber security regulation that applies to operators of essential services
- 10. Incident where information or systems are accessed in an unauthorised way
Down
- 1. EU data protection law enforced May 2018
- 2. Something likely to cause damage or disruption
- 4. Process of granting or denying access requests
- 5. Email scam targeted towards a specific individual
- 7. Assurance that information is trustworthy
- 8. Something of value
