Across
- 1. Refers to accounts that use the name, image, or other identifying elements of a person, company, or organisation for fraudulent purposes (2)
- 5. Weaknesses within an enterprise system that allow cyber criminals to gain unauthorised access
- 6. Word related to data being held on system devices such as hard drives and servers
- 7. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- 10. Security process that relies on the unique biological characteristics of individuals to verify they are who they say they are
- 14. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge
- 15. Backup Strategy for sending a copy of data to a secondary, off-site, online location
- 18. The process of translating plain text data (plaintext) into something that appears to be random and meaningless
- 20. Type of encryption that involves the use of one key for both encryption and decryption
- 21. Type of backup that backs up everything since the last back up
- 23. Type of backup that involves backing up data that was created or changed since the last full backup
- 28. Law which upholds the right of the public to access information that the government holds about them (4)
- 30. Cyber attack that occurs when a hacker tries to trick users into connecting to a fake Wi-Fi access point that mimics a real network (2)
- 31. Type of backup that contains only those files which have been altered since the last backup
- 32. Secret data, typically a string of characters, usually used to confirm a user's identity online. Used when logging into a system
- 33. Type of malware that permanently blocks access to the victim's personal data unless a ransom is paid
- 34. The act of compromising digital devices and networks through unauthorised access to an account or computer system
Down
- 2. An individual or organisation that conducts malicious activity, such as cyber espionage, cyber attacks or cyber-enabled crime. Otherwise known as a cyber criminal (2)
- 3. The protection of information that says who we are, what we do and what we believe
- 4. Any information connected to a specific individual that can be used to uncover that individual's identity (3)
- 8. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 9. The assurance that sensitive information is accessed only by authorised individuals or entities
- 11. A perceived threat to an organisation that comes from people within the organisation (2)
- 12. A set of instructions to help IT staff detect, respond to, and recover from network security incidents (3)
- 13. Cyber attack that consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found (3)
- 16. The greatest vulnerability in a system when thinking about cybersecurity
- 17. Attack carried out by flooding the target system with a huge number of requests to cause a crash meaning the website, online shop or digital services are unavailable for legitimate requests
- 19. Divides a computer network into smaller parts. The purpose is to improve network performance and security.
- 22. The process of converting ciphertext (random and meaningless) back to plaintext
- 24. The accuracy, completeness, and quality of data as it’s maintained over time and across formats (2)
- 25. A cyber attack in which credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service (2)
- 26. IoT (3)
- 27. A type of backup in which an exact replica of data is created and stored in a separate location
- 29. Type of encryption that works with a pair of keys. It involves the creation of a pair of keys, one of which is a public key, and the other which is a private key. The public key is accessible by anyone, while the private key must be kept a secret from everyone but the creator of the key