Cyber Defences

1234567891011
Across
  1. 3. Should be strong and have MFA
  2. 6. Protects against viruses and worms
  3. 7. This will protect a device/networks ports
  4. 8. This is used to attract cyber attacks
  5. 9. Used to record activity and find source of intrusions
  6. 10. What to do to USB ports to prevent data exfiltration
  7. 11. An update with a fix for a vulnerability
Down
  1. 1. Can give false positives that distract administrator (acronym)
  2. 2. These should be restricted to prevent users from having more access than required
  3. 4. Teaches staff how to prevent falling for phishing scams
  4. 5. Makes data unreadable
  5. 10. Best defence against ransomware