BTEC DIT C3.3 - Wider implications

123456789101112
Across
  1. 4. When a security breach has been conducted by an organisations own employee
  2. 8. Method of protecting written work, drama, music, art, photos etc from being copied or used without permission
  3. 10. Method of protecting inventions from copies
  4. 11. Net ____________ : the principle that Internet Service Providers (ISPs) treat all internet traffic equally
  5. 12. __________ access: ensuring that organisations and individuals benefit from the full range of technology
Down
  1. 1. When hacking is used to spy on other companies / steal ideas/designs
  2. 2. Data __________ Act: law for ensuring personal data used by organisations is handled lawfully.
  3. 3. malicious software
  4. 5. When a system is hacked with the purpose to prevent an organisation from functioning properly
  5. 6. ____________ property: something you create that is unique to you. E.g. brand names, inventions, designs.
  6. 7. __________ loss: When an organisation loses money as a result of an attack
  7. 9. Method of protecting brands such as product names, logos and jingles