Across
- 2. Creating copies of data to restore in case of loss.
- 5. Verifying the identity of a user or device.
- 7. Securing hardware and premises from unauthorised access.
- 8. A network security system that monitors and controls incoming and outgoing network traffic.
- 9. Restricting what users can view or modify within a system.
- 10. Converting data into a code to prevent unauthorised access.
- 11. Secret words or phrases used to authenticate users.
- 12. Firewalls perform this function to control network traffic.
Down
- 1. A software update designed to fix bugs or vulnerabilities.
- 3. A simulated cyberattack against a system to find vulnerabilities.
- 4. Regularly applying patches to software to fix vulnerabilities.
- 5. Software designed to detect and remove malicious programs.
- 6. Using unique biological characteristics for authentication.
