Across
- 2. (8) - Malicious software designed to damage or disrupt computer systems
- 4. (8) - Fraudulent attempt to trick users into revealing personal or financial information
- 5. (11,6) - Backup method copying only files changed since the last backup
- 6. (8,7) - Surveillance devices used to monitor and protect buildings or systems
- 8. (6,3,10) - Security method using a publicly shared key for encryption
- 10. (10,10) - Encryption method using separate public and private keys
- 11. (6,4) - Copies of files and information kept for recovery if data is lost
- 13. (4,8) - Process of restoring lost, damaged or deleted information
- 14. (6,2,9,6) - Different permissions given to users to control access to data
- 16. (9) - Security systems that monitor and control network traffic entering or leaving a computer
- 19. (8,7) - Techniques used to retrieve or restore lost data
- 20. (12,6) - Backup method copying files changed since the last full backup
- 21. (6,8) - Password using a mixture of letters, numbers and symbols for improved security
- 22. (7,6) - Backup stored in a different location to protect against disasters or theft
Down
- 1. (10,6) - Unintentional harm caused to systems or data through human error
- 3. (10,8) - Programs used to detect, prevent and remove malicious software
- 7. (11,7) - Security threats carried out by attackers looking for easy targets
- 9. (9,10) - Encryption method using the same key to encrypt and decrypt data
- 12. (8,8) - Physical security methods used to protect devices and information
- 15. (9) - Secret codes used to gain authorised access to systems and accounts
- 17. (10) - Process of converting readable data into coded information for security
- 18. (4,6) - Backup method that copies all selected data and files
