Cybersecurity

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 3. Any information connected to a specific individual that can be used to uncover that individual's identity (3)
  2. 10. Word referring to who can use a specific system or view specific data
  3. 12. A security measure that requires two or more proofs of identity to grant you access to a system (3)
  4. 13. A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
  5. 14. The process of translating plain text data (plaintext) into something that appears to be random and meaningless
  6. 15. A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
  7. 17. A type of backup in which an exact replica of data is created and stored in a separate location
  8. 18. A broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems (2)
  9. 20. IoT (3)
  10. 22. Law which upholds the right of the public to access information that the government holds about them (4)
  11. 24. The assurance that sensitive information is accessed only by authorised individuals or entities
  12. 25. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  13. 29. The protection of information that says who we are, what we do and what we believe
  14. 32. is a type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
  15. 33. Type of backup that contains only those files which have been altered since the last backup
  16. 34. attack is carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
  17. 35. Type of cyber attack that uses third-party tools or services to infiltrate a target’s system or network (2)
  18. 36. Divides a computer network into smaller parts. The purpose is to improve network performance and security.
  19. 37. Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key
  20. 38. Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
Down
  1. 1. Physical, network, and operational separation of data to keep it safe from both external cyberattacks and internal threats
  2. 2. Type of backup that involves backing up data that was created or changed since the last full backup
  3. 4. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
  4. 5. Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
  5. 6. The process of converting ciphertext (random and meaningless) back to plaintext
  6. 7. The act of compromising digital devices and networks through unauthorised access to an account or computer system
  7. 8. A perceived threat to an organisation that comes from people within the organisation (2)
  8. 9. Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
  9. 11. Word related to data being held on system devices such as hard drives and servers
  10. 16. An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
  11. 19. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  12. 21. Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
  13. 23. Backup Strategy for sending a copy of data to a secondary, off-site, online location
  14. 26. Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
  15. 27. The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
  16. 28. Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
  17. 30. The greatest vulnerability in a system when thinking about cybersecurity
  18. 31. Type of backup that backs up everything since the last back up
  19. 32. A tool used in risk management to assess and prioritise risks based on their likelihood and potential impact (2)
  20. 35. Type of encryption that involves the use of one key for both encryption and decryption