BTEC DIT C3.3 - Wider implications
Across
- 4. When a security breach has been conducted by an organisations own employee
- 8. Method of protecting written work, drama, music, art, photos etc from being copied or used without permission
- 10. Method of protecting inventions from copies
- 11. Net ____________ : the principle that Internet Service Providers (ISPs) treat all internet traffic equally
- 12. __________ access: ensuring that organisations and individuals benefit from the full range of technology
Down
- 1. When hacking is used to spy on other companies / steal ideas/designs
- 2. Data __________ Act: law for ensuring personal data used by organisations is handled lawfully.
- 3. malicious software
- 5. When a system is hacked with the purpose to prevent an organisation from functioning properly
- 6. ____________ property: something you create that is unique to you. E.g. brand names, inventions, designs.
- 7. __________ loss: When an organisation loses money as a result of an attack
- 9. Method of protecting brands such as product names, logos and jingles