Across
- 3. A person who uses computers to gain unauthorised access to data.
- 7. A network device that forwards data packets between computer networks
- 9. Security techniques that use biological data for authentication.
- 11. An encryption-based Internet security protocol
- 12. A number of internet connected devices each of which is running one or more bots
Down
- 1. a piece of software designed to update a computer program or its supporting data to fix or improve it.
- 2. No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
- 4. Software designed to detect and destroy computer viruses
- 5. A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
- 6. Highlighted policy in march security bytes newsletter
- 8. A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
- 10. The practice of protecting systems, networks and programs from digital attacks