Cybersecurity

123456789101112
Across
  1. 2. Fraudulent messages sent to trick users into revealing sensitive information
  2. 4. Unintentional user actions that cause data loss or damage
  3. 6. Granting permissions to a user based on their role
  4. 7. Restricting who can view or use resources in a system
  5. 8. Software designed to damage or gain unauthorised access to a system
  6. 9. A copy of data stored to prevent loss in case of system failure
  7. 10. Verifying a user’s identity before granting access
  8. 12. Malware disguised as legitimate software to trick users
Down
  1. 1. A security system that monitors and controls incoming and outgoing network traffic
  2. 3. Deliberate actions aimed at harming IT systems or stealing data
  3. 5. Malware that encrypts files and demands payment to restore access
  4. 11. A malware that attaches to files or programs and spreads when shared