Learning Aim B: Cyber security

1234567891011121314
Across
  1. 5. A security risk that comes from within an organisation, such as an employee.
  2. 7. A security risk from outside an organisation, like a hacker or malware attack.
  3. 8. Manipulating people into revealing confidential information.
  4. 10. Malware that locks or encrypts a user’s files, demanding payment for access.
  5. 11. The process of verifying a user’s identity before granting access.
  6. 12. A person who illegally accesses or manipulates computer systems.
  7. 14. Software designed to detect and remove malicious programs.
Down
  1. 1. Software that secretly gathers user information without permission.
  2. 2. A controlled cyber attack to identify security weaknesses.
  3. 3. Malicious software designed to harm or exploit systems
  4. 4. A type of malware that disguises itself as legitimate software.
  5. 6. A cyber attack using fake emails to trick users into giving personal information.
  6. 9. The process of converting data into a code to prevent unauthorized access.
  7. 13. A security system that controls incoming and outgoing network traffic.