Across
- 4. A suite of technologies that can identify unauthorised users of a computer system (7,9)
- 5. Software whose purpose is to remove harmful software from your system (4-7)
- 7. The process of scrambling data so it can be sent securely over networks (10)
- 8. Checking for weaknesses in your own system before a hacker finds them (11,7)
- 9. Repeatedly accessing a website in order to prevent genuine users from accessing it (6,2,7)
- 10. A generic term to describe any piece of software that is harmful to your computer (7)
- 11. A means of hacking that tries every possible password in quick succession (5,5)
Down
- 1. Hardware- or software-based security which controls incoming and outgoing network traffic based on a set of rules (8)
- 2. When used alongside passwords, these can control what individual users can see and do on a computer system (4,6,6)
- 3. The act of gathering information by spoofing trustworthy websites for malicious intent (8)
- 6. A set of rules that govern how a network is managed and used (7,8)