4. Computer security

123456789101112131415161718192021222324
Across
  1. 2. The process of making data in a computer system unintelligible.
  2. 4. Any software which has been written with the intent to cause disruption, damage or inconvenience.
  3. 7. A form of identification and authentication which relies on comparing scans of e.g. your face, fingerprints, eye retina etc with a stored set of information."
  4. 9. Any system which periodically checks and downloads / updates software to make sure it always has the latest bug fixes and enhancements.
  5. 14. The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.
  6. 16. that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  7. 19. A program that appears harmless, but is, in fact, malicious."
  8. 20. A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
  9. 21. A group of software policies and written procedures which together help to enhance and maintain the security of data held on a computer network.
  10. 22. Sending emails purporting to be from reputable companies to induce people to reveal personal information.
  11. 23. A cyber attack intended to redirect a website's traffic to another, fake site.
  12. 24. The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
Down
  1. 1. Testing designed to check the security and vulnerabilities of a system.
  2. 3. The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
  3. 5. The process by which a user logging into a system can be checked and verified before being given access.
  4. 6. Allows devices to access, or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.
  5. 8. A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites."
  6. 10. that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
  7. 11. Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.
  8. 12. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data."
  9. 13. A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
  10. 15. Observing a person's private information over their shoulder eg cashpoint machine PIN numbers.
  11. 17. Any storage media which can easily be removed from a computer thus allowing the transport of data away e.g. Optical Disk, flash / USB pen etc.
  12. 18. A secret word or phrase that must be used to gain access to a computer / program / interface / system.