Across
- 4. Exposes any attempts by attackers to overcome security controls.
- 5. Natural disasters such as floods.
- 6. Countries always spy on each other.
- 7. The level of assurance that the data will be available to those who need it when they want it.
- 8. A person who uses existing codes to hack into computers.
- 9. The real name of our cyber security teacher.
Down
- 1. A method that is used to test the security of software.
- 2. Access must be restricted to those authorised to view the data in question.
- 3. An individual who gains unauthorised access to a computer system or network.
- 4. The level of assurance as to the accuracy and trustworthiness of the data.
- 7. Software designed to prevent, detect and eradicate malicious software.