UNIT 1 LEARNING AIM D

12345678910111213
Across
  1. 3. (9)Security software that detects, quarantines and removes malicious code
  2. 5. (7)Malicious software designed to compromise confidentiality, integrity or availability of dataPHISHING (8)Social engineering attack that relies on deception rather than technical exploits
  3. 7. (8)Network security system that filters traffic based on predefined rules
  4. 10. (14)The process of verifying that a user is who they claim to be
  5. 12. (9) Rules that define how data is securely transmitted across networks
  6. 13. (4) UK regulation governing the collection, storage and processing of personal data
Down
  1. 1. (11)Rules applied to files and folders to restrict user actions
  2. 2. (10)Loss, theft or unauthorised disclosure of personal or sensitive information
  3. 3. (11)Restrictions placed on users based on their role within an organisation
  4. 4. (3)UK authority responsible for enforcing data protection legislation
  5. 6. (10)Process that converts readable data into an unreadable format without a key
  6. 8. (8)The ability to restore systems and data following an incident
  7. 9. (8)Social engineering attack that relies on deception rather than technical exploits
  8. 11. (6)A secondary copy of data stored to support recovery after failure or attack