Unit 3 Cyber Security

12345678910111213
Across
  1. 2. Level of assurance that the data will be available to those who need it when they want it
  2. 4. Countries have always spied on each other
  3. 7. Gaining the trust of individuals and using that trust to influence them to give confidential information
  4. 8. Rules which restrict access only to those who need to know
  5. 9. Level of assurance which can be given as to the accuracy and trustworthiness of the data
  6. 10. Sending so much traffic to a computer system that it cannot cope, denying access to legitimate users
  7. 11. Devices or programs that detect attempts at intrusion and take action to prevent them
  8. 13. Normally criminal activities because the intention is to cause harm to the computer or system
Down
  1. 1. To see how the system copes when subjected to conditions which would cause the vulnerabilities to become apparent
  2. 3. Exposes any attempts by attackers to overcome security controls to compromise data or other resources
  3. 5. This includes cyber enabled crime and cyber dependent crime.
  4. 6. Any threat which is a result of a natural event
  5. 12. Any threat to the system or computer through physical access. These include loss or theft of equipment. E.g. tablet or laptop, portable memory