Year 12 Cybersecurity

123456789101112131415161718192021
Across
  1. 4. A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
  2. 5. An individual who simulates cyberattacks to evaluate the security of a system.
  3. 6. A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
  4. 10. Measures taken to protect physical assets and facilities from unauthorized access or harm.
  5. 11. The accuracy and reliability of data, protected from unauthorized alteration.
  6. 13. A hacker who engages in malicious activities for personal gain or to cause harm.
  7. 16. Mistakes made by individuals that can lead to security breaches.
  8. 18. Creating multiple security layers to prevent unauthorized access at different levels.
  9. 20. Covert agents who gather information on behalf of a government or organization.
  10. 21. An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
  1. 1. Ensuring that sensitive information is accessible only to authorized individuals.
  2. 2. The ability to identify and recognize cybersecurity threats and incidents.
  3. 3. Making sure that data is accessible when needed, without unauthorized disruptions.
  4. 7. Individuals with advanced computer skills who manipulate software or systems for various purposes.
  5. 8. Covert activities aimed at gathering confidential information from competitors or enemies.
  6. 9. Individuals who engage in illegal activities on the internet for financial gain.
  7. 12. People within an organization who have access to sensitive information and can pose security risks.
  8. 14. Implementing measures to discourage potential attackers from targeting a system or organization.
  9. 15. Introducing obstacles and barriers to slow down attackers' progress.
  10. 17. The process of restoring systems and data after a cybersecurity breach or incident.
  11. 19. Taking swift actions to address and mitigate cybersecurity incidents.