Unit 3 Cyber Security

12345678
Across
  1. 3. someone who doesn't have the technical expertise to create their own software so they use software or scripts created by someone else
  2. 6. gaining access to computer systems,networks,data and programmes without permission
  3. 7. data is available to those who need it, when they need it
  4. 8. loss or theft of equipment
Down
  1. 1. data is entered,amended,stored and deleted by those with authorisation
  2. 2. intercepting data packets and identify suspicious traffic
  3. 4. someone who uses a computer as either a tool and/or a target to commit a crime
  4. 5. network or system attack by someone who has authorised access