T Level Paper 2 Revision

12345678910111213
Across
  1. 2. A type of malware that encrypts files and demands payment
  2. 3. A weakness in a system that can be exploited by a threat
  3. 4. A virtual space where users interact with applications and services over the internet
  4. 6. A network type that allows remote access to a secure private system
  5. 9. A type of cloud service that provides a fully managed computing environment
  6. 10. A security measure that inspects and filters network traffic
  7. 11. A key concern when deploying applications in a cloud environment
  8. 12. A form of cyber attack where an attacker tricks users into providing sensitive information
Down
  1. 1. The process of encoding data to prevent unauthorized access
  2. 5. A type of cyber attack that floods a network with traffic
  3. 6. A model of computing where resources are dynamically allocated and managed as needed
  4. 7. The ability of a system to handle increasing workloads by adding resources
  5. 8. A security process that verifies a user's identity
  6. 13. A legal framework that regulates personal data protection