Paper 2

12345678910111213141516
Across
  1. 3. Backup type that saves only changed files since the last full backup
  2. 5. Malicious software designed to damage or gain access to systems
  3. 7. The act of verifying a user’s identity
  4. 10. A simulated attack to test system defenses
  5. 12. Technique used to scramble data to prevent unauthorized access
  6. 13. Attack that overwhelms a system to make it unavailable
  7. 16. A social engineering attack that tricks users into giving up credentials
Down
  1. 1. The physical machines used in digital infrastructure
  2. 2. Used to simulate hardware environments for testing or development
  3. 4. Extra layer of login protection using a second device or code
  4. 6. type that saves only changed files since the last full backup
  5. 8. Technology that connects devices over short distances wirelessly
  6. 9. A self-replicating program that spreads without user action
  7. 11. Virtual or physical environment used for testing
  8. 14. A fake website designed to steal user data
  9. 15. Legislation protecting personal data in the UK