COMPUTER OPERATIONS

12345678910111213141516171819
Across
  1. 4. includes systems analysts, database designers and programmers who design and build the system
  2. 5. those for whom the system is built
  3. 6. a software program that allows unauthorized access to a system without going through the normal logon procedure
  4. 9. a comprehensive statement of all actions to be taken before, during and after any type of disaster, along with documented, tested procedures that will ensure the continuity of operations
  5. 10. used interchangeably with virus
  6. 11. the ability of the system to continue operation when part of the system fails due to hardware failure, applications program error or operator error
  7. 13. involves policy, procedures and controls that determine who can access the operating system
  8. 15. the computer's control program
  9. 17. the operating system's first line of defense against unauthorized access
  10. 19. involves trickery that makes a message appear as if it came from an authorized individual or firm when it did not
Down
  1. 1. HORSE a program whose purpose is to capture IDs and passwords from unsuspecting users
  2. 2. a secret code entered by the user to gain access to systems, applications, data files or a network server
  3. 3. an alternative to the centralized model is the concept of
  4. 7. a program that attaches itself to a legitimate program to penetrate the operating system
  5. 8. individuals inside or outside the firm who have an interest in the system, but are not end users
  6. 12. function transcribes transaction data from paper source documents into computer input
  7. 14. the electronic files produced are later processed by the central computer, which is managed by
  8. 16. defined generally as any unsolicited e-mail
  9. 17. a destructive program, such as virus, that is triggered by some predetermined event
  10. 18. a room adjacent to the computer center that provides safe storage for the off-line data files