Security Bytes - March 2024

123456789101112
Across
  1. 3. A person who uses computers to gain unauthorised access to data.
  2. 7. A network device that forwards data packets between computer networks
  3. 9. Security techniques that use biological data for authentication.
  4. 11. An encryption-based Internet security protocol
  5. 12. A number of internet connected devices each of which is running one or more bots
Down
  1. 1. a piece of software designed to update a computer program or its supporting data to fix or improve it.
  2. 2. No one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.
  3. 4. Software designed to detect and destroy computer viruses
  4. 5. A vulnerability that is unknown to those who would be interested in mitigating the vulnerability, including the vendor of the target software.
  5. 6. Highlighted policy in march security bytes newsletter
  6. 8. A process or set of rules to be followed in calculations or problem solving operations, especially by a computer.
  7. 10. The practice of protecting systems, networks and programs from digital attacks