Cyber Security Month 2023

12345678910111213141516
Across
  1. 3. Processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  2. 6. The ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans
  3. 9. An important process that verifies a user is really who they are; many was this can be done
  4. 10. An example would be an email from a Nigerian prince asking you for your personal details including bank details to you can receive millions of dollars
  5. 11. An attack that hijacks your system and denies you access until you send money
  6. 12. Characteristics used to identify a person
  7. 13. The form of encryption that requires two different credentials
  8. 14. Malware hidden as an attachment or free download
Down
  1. 1. The state of being free from danger for threat
  2. 2. Bullying that takes place online
  3. 4. Type of cyber attack where a person is tricked into give information via a text message
  4. 5. Digital currency, preference for hackers
  5. 7. A person who tries to gain unauthorised access to a network or computer system.
  6. 8. When a hacker successfully exploits a device and gains access to files and data
  7. 15. An annoying malware that spams you with ads
  8. 16. A fraudulent or deceptive act or operation