Across
- 5. A security risk that comes from within an organisation, such as an employee.
- 7. A security risk from outside an organisation, like a hacker or malware attack.
- 8. Manipulating people into revealing confidential information.
- 10. Malware that locks or encrypts a user’s files, demanding payment for access.
- 11. The process of verifying a user’s identity before granting access.
- 12. A person who illegally accesses or manipulates computer systems.
- 14. Software designed to detect and remove malicious programs.
Down
- 1. Software that secretly gathers user information without permission.
- 2. A controlled cyber attack to identify security weaknesses.
- 3. Malicious software designed to harm or exploit systems
- 4. A type of malware that disguises itself as legitimate software.
- 6. A cyber attack using fake emails to trick users into giving personal information.
- 9. The process of converting data into a code to prevent unauthorized access.
- 13. A security system that controls incoming and outgoing network traffic.
