Across
- 4. A browser window that appears on top of another window, often to show advertisements
- 7. A person who breaks into computers to view and possibly change information they shouldn't access
- 10. Pool of private sector consultants approved by CESG to provide IA advice to government
- 12. Solution that prevents recursive domain nameserver (DNS)
- 14. Information security arm of GCHQ
- 15. REMOTE CAPS approved encryption device part of AEP SCP solution
Down
- 1. Service that helps private sector companies develop cryptographic products for use by HMG
- 2. Technology protocol for securing IP communications
- 3. Group of computers networked together over a public network - the internet
- 5. Hack used to make pharmaceutical sales appear higher in the Google search results
- 6. Program in which malicious or harmful code is contained within
- 8. Government agencies use this AEP solution for CAPS approved data remote access
- 9. Coordination of the internets naming system
- 11. Secure Communications legacy protocol (hand out)
- 13. The attackers masquerade as a trusted system to try to persuade you to send secret information to them
