HT3: Cyber Security
k | m | l | y | n | u | g | k | n | s | l | k | e | d |
c | o | t | b | o | p | a | c | s | e | l | u | r | h |
k | w | a | l | i | o | v | v | g | i | a | o | n | w |
s | t | a | n | t | i | - | m | a | l | w | a | r | e |
k | c | r | h | a | t | u | r | b | s | e | t | c | e |
m | a | i | a | c | l | a | p | s | g | r | o | y | y |
u | r | b | r | i | t | y | a | d | d | i | b | v | c |
b | f | e | e | t | n | p | s | t | a | f | f | j | p |
b | s | i | m | n | e | i | a | i | w | t | e | n | p |
w | r | m | a | e | e | m | n | c | s | y | e | r | p |
f | o | k | b | h | d | f | o | g | n | y | s | s | a |
a | o | t | u | t | g | s | i | i | s | v | g | j | g |
p | y | g | u | u | t | t | d | t | b | n | e | l | l |
v | f | u | f | a | c | t | o | r | h | h | b | j | o |
software which can detect and remove malware on a computer | (12) a _ _ _ _ _ _ _ _ _ _ _ | |
telling a computer to install the latest updates automatically so that insecure software can be fixed | (4) a _ _ _ / (7) u _ _ _ _ _ _ | |
using fingerprints, iris scanning or other unique biological identifiers to log in a user | (10) b _ _ _ _ _ _ _ _ _ | |
completely automated public turing test to tell the difference between people trying to log in and malicious software trying all password combinations | (7) C _ _ _ _ _ _ | |
working out if it's worth spending money to get the advantages it brings | (4) c _ _ _ / (7) b _ _ _ _ _ _ / (8) a _ _ _ _ _ _ _ | |
a filter on network traffic which blocks or allows connections to and from computers based on a set of rules | (8) f _ _ _ _ _ _ _ | |
requirements for passwords to make them harder for hackers to guess | (8) p _ _ _ _ _ _ _ / (5) r _ _ _ _ | |
educating users how to choose secure passwords and keep their login details safe | (5) s _ _ _ _ / (8) t _ _ _ _ _ _ _ | |
making a user confirm that they are trying to log in using text, phone or app after they've put in their password | (3) t _ _ / (6) f _ _ _ _ _ / (14) a _ _ _ _ _ _ _ _ _ _ _ _ _ |