Across
- 2. Checks incoming and outgoing network traffic for threats
- 6. Hackers with no technical hacking knowledge
- 7. Mathematically converts data into a form that is unreadable without a key
- 9. Updating software to remove vulnerabilities automatically
- 13. Type of testing that tests a network for vulnerabilities
- 14. Directly observing someone enter personal details eg Pin, password
- 15. Looking at common attacks and methods to protect ourselves and our networks against attacks
Down
- 1. Inventing a scenario to obtaining personal information
- 3. Verifying the identity of a user or process
- 4. Raw facts and figures
- 5. Created from the user fingerprint, iris, retina, facial, voice
- 8. gaining unauthorised access to or control of a computer system
- 10. Adverts for products a user may be interested in, based on internet history
- 11. Distributed Denial of Service
- 12. Data that has been processed and has context
- 16. Completely Automated Public Turing Test To Tell Computers and Humans Apart