BTEC DIT Component 3 Key Terms Crossword
Across
- 4. A type of network set up for a specific, immediate purpose such as a personal hotspot.
- 6. A method of identifying and protecting an organisation's unique symbols or brand.
- 9. Meeting legal obligations through features like screen reader support and alt text.
- 10. A period when software updates or maintenance make a digital system unavailable.
- 12. A requirement that data stored about an individual must be correct and kept up to date.
- 13. A legal right that protects original materials from being used without permission or licensing.
- 15. An external threat where a system is attacked for industrial or financial gain.
- 16. Visual representations, such as data flow or system maps, used to communicate technical information.
- 18. A specific type of malware that restricts access to data until a sum of money is paid.
- 19. An attack using emails, texts, or phone calls to trick users into providing data.
- 24. The act of gaining unauthorised access to a digital system.
- 25. The process of securing a device by reducing its vulnerabilities through specific parameters.
- 26. Potential penalties defined in an acceptable use policy if unacceptable behaviour occurs.
- 27. The ability to increase or decrease cloud storage by renting or freeing space to save money.
- 28. A type of property, such as a trademark or patent, that belongs to an organisation.
Down
- 1. The principle that ensures an organisation collects only the information that is specifically needed for a task.
- 2. The first action to take after a cyber attack to establish the severity and nature of the breach.
- 3. A user access restriction method that uses physical characteristics like fingerprints for authentication.
- 5. A form of notation used by organisations to explain processes or the flow of data.
- 7. The process of scrambling stored or transmitted data so it can only be read by authorised parties.
- 8. Hardware or software used as a data level protection measure to block unauthorised traffic.
- 11. Facilitation of a team member's needs through technology to ensure they are not bound by geographical or physical restrictions.
- 13. Tools or features within cloud computing that allow multiple people to work together on a single shared file.
- 14. The part of a policy where an individual signs or clicks to acknowledge they will abide by the rules.
- 17. Small files used to track transactional data and exchange information between services.
- 20. The principle that internet service providers should enable access to all content and applications regardless of the source.
- 21. A legal method used by organisations to protect their inventions or new processes.
- 22. An external threat used to redirect users to a fraudulent website.
- 23. A general term for software such as viruses, worms, and botnets designed to damage systems.
- 29. A data protection principle stating that processing must be done in a legal and fair manner.