Across
- 7. The assurance that information is disclosed only to authorised entities.
- 9. The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
- 10. A feature or defect of a computer system that allows access to data by bypassing normal security measures.
- 11. An event that is not part of normal operations that disrupts operational processes.
- 13. A defect, fault or imperfection, especially one that is hidden or unknown.
- 14. The methods used to manipulate people into carrying out specific actions, or divulging information.
- 16. Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
- 17. A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
- 19. A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
- 20. The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
- 1. A software program or group of software programs designed for end users.
- 2. A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
- 3. Measurable physical characteristics used to identify or verify an individual.
- 4. The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
- 5. A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
- 6. A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
- 8. The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
- 12. A collection of data or instructions that tell a computer how to work.
- 15. Malicious software that makes data or systems unusable until the victim makes a payment.
- 18. Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.
