Cyber Security

1234567
Across
  1. 3. The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
  2. 5. A cyber attack intended to redirect a website's traffic to another, fake site.
  3. 6. A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
  4. 7. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
  1. 1. Observing a person's private information over their shoulder eg cashpoint machine PINs.
  2. 2. A computer program or system intended to distinguish human from machine input
  3. 4. A form of identification and authentication which relies on comparing scans of e.g. your face