June 12 - InfoSec

1234567891011121314151617181920212223242526272829
Across
  1. 2. Protecting systems and data from threats
  2. 5. Computer equipment which protects your network from hackers gaining remote access
  3. 7. Keeping personal information secure
  4. 9. What needs to be kept private and secure
  5. 13. Files that may contain sensitive information
  6. 15. Person who gains unauthorized access to a computer system
  7. 18. Program that deletes files and/or programs
  8. 19. Group of connected computers
  9. 20. Ensuring data remains unaltered and trustworthy
  10. 21. Permissions granted to view or use data/systems
  11. 26. Rules and policies governing cybersecurity practices
  12. 28. Digital information that needs safeguarding
  13. 29. Being alert to potential cybersecurity risks
Down
  1. 1. The protection of computers, networks and data from malware and hackers
  2. 3. Where a person lies to another to trick them into giving over money or information
  3. 4. Sending fake emails telling victims to log onto a fake website which steals their password and login details
  4. 6. Malware which gives a hacker admin powers to control your computer
  5. 8. Malware which completes small repetitive tasks (used in DDoS attacks)
  6. 10. Someone who might visit offices to teach workers about cybersecurity
  7. 11. Obligation to follow security best practices
  8. 12. Program which appears useful, but hides malicious software inside
  9. 13. Causing a website to crash by directing millions of computers to simultaneously request data from it (4 letter acronym)
  10. 14. Preventing unauthorized disclosure of information
  11. 16. A flaw in a program or network which makes it vulnerable to hacking
  12. 17. Potential danger that could breach security
  13. 22. Measures to limit access and maintain security
  14. 23. Plan to maintain cybersecurity defenses
  15. 24. Another name for a software engineer
  16. 25. String of letters, numbers and characters entered along with a user ID to log in
  17. 27. Umbrella term for various programs that cause problems, including viruses, ransomware and trojans