Across
- 2. Used to monitor traffic in and out of a network
- 6. Software that aims to gather information about a person or organisation without their consent
- 7. A list of jobs and who will complete them
- 8. Physical prevention measure. Used on a door
- 10. A chart that shows jobs to be completed, how long they will take and who by
- 12. Type of malicious software that threatens to publish victim's data and block access to it unless a ransom is paid
- 17. Ethical hackers
- 19. Just letters
- 21. Drop down boxes are an example
- 23. Data that has been processed
- 25. Cheap, portable, durable storage device
Down
- 1. Online storage
- 2. A diagram showing jobs and how they link together
- 3. A strong one would include letters, numbers and symbols
- 4. Yes/No
- 5. Raw facts and figures
- 9. A good way to physically destroy paper
- 11. Used to prevent malware getting on your computer
- 13. Numbers and letters
- 14. Form of social engineering, sending an email that looks legitimate
- 15. Trying to get information by offering a bogus/fake deal
- 16. Using someone else's internet
- 18. Different members of staff have access to different folders
- 20. Examples include retina and fingerprint scanners
- 22. Number of internet connected devices, each of which is running one of more bots
- 24. A colourful creative way of expressing ideas
