Across
- 3. A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and computer equipment.
- 4. The assurance that systems and data are accessible and useable
- 5. A sequence of words used for authentication.
- 7. A method used to discover errors or potential security vulnerabilities in software.
- 8. A collection of private computers that are infected with malicious software that are being controlled without the owner’s knowledge.
- 9. Our hashtag
- 12. Measurable physical characteristics used to identify or verify an individual.
- 16. Data that is being communicated across a communication medium is said to be "in ____"
- 17. A sequence of characters used for authentication.
- 18. A computer that provides services to users or other systems.
- 21. A generic term for hardware which is used to store data.
- 22. A previously unknown, bug, flaw, or backdoor in software is known as a "____ day".
- 23. A user who can alter or circumvent a system’s controls is said to be "____"
- 24. The categorisation of systems and data according to the expected impact if it was to be compromised.
- 26. Malware used to gain access to a user’s systems and monitor their data, files, and behavior.
- 29. The use of different character sets, such as lower-case characters , upper-case characters , numeric characters and special characters increases as password's "____".
- 31. a form of malware that disguises itself as legitimate software but performs malicious activity when executed
- 33. Any circumstance or event with the potential to harm systems or data.
- 34. Descriptive data about the content and context used to identify data.
- 36. Measures used to protect the confidentiality, integrity and availability of systems and data.
- 37. A weakness in a system’s security requirements, design, implementation or operation that could be accidentally triggered or intentionally exploited and result in a violation of the system’s security policy.
- 39. The principle of restricting an individual’s access to only the data they require to fulfil the duties of their role.
Down
- 1. Code that attempts to subvert the confidentiality, integrity or availability of a system is "____"
- 2. Verifying the identity of a user
- 6. email that falsely claims to be from a legitimate source, usually with a threat or request for information
- 9. A security process that uses an additional factor for verification is called "____ factor authentication"
- 10. An evident change to the normal behaviour of a network, system or user is called "an ____".
- 11. The assurance that data is disclosed only to authorised entities.
- 13. a type of malware that encrypts a victim’s information and demands payment in return for the decryption key
- 14. A senior executive who is responsible for cybersecurity
- 15. A network device that filters incoming and outgoing network data based on a series of rules.
- 19. Anything of value, such as computer equipment, software or data.
- 20. The act of exploiting human weaknesses to gain access to personal information and protected systems is called "____ engineering"
- 25. Software embedded in computer equipment.
- 27. The level of security risk to which a system is exposed.
- 28. These securely manage data flows between connected networks.
- 30. A tube, duct or pipe used to protect cables.
- 32. The assurance that data has been created, amended or deleted only by authorised individuals.
- 35. Data that resides on media or a system is said to be "at ____"
- 38. An individual that is authorised to access a system.