Across
- 3. (9)Security software that detects, quarantines and removes malicious code
- 5. (7)Malicious software designed to compromise confidentiality, integrity or availability of dataPHISHING (8)Social engineering attack that relies on deception rather than technical exploits
- 7. (8)Network security system that filters traffic based on predefined rules
- 10. (14)The process of verifying that a user is who they claim to be
- 12. (9) Rules that define how data is securely transmitted across networks
- 13. (4) UK regulation governing the collection, storage and processing of personal data
Down
- 1. (11)Rules applied to files and folders to restrict user actions
- 2. (10)Loss, theft or unauthorised disclosure of personal or sensitive information
- 3. (11)Restrictions placed on users based on their role within an organisation
- 4. (3)UK authority responsible for enforcing data protection legislation
- 6. (10)Process that converts readable data into an unreadable format without a key
- 8. (8)The ability to restore systems and data following an incident
- 9. (8)Social engineering attack that relies on deception rather than technical exploits
- 11. (6)A secondary copy of data stored to support recovery after failure or attack
