COMPUTER OPERATIONS
Across
- 4. includes systems analysts, database designers and programmers who design and build the system
- 5. those for whom the system is built
- 6. a software program that allows unauthorized access to a system without going through the normal logon procedure
- 9. a comprehensive statement of all actions to be taken before, during and after any type of disaster, along with documented, tested procedures that will ensure the continuity of operations
- 10. used interchangeably with virus
- 11. the ability of the system to continue operation when part of the system fails due to hardware failure, applications program error or operator error
- 13. involves policy, procedures and controls that determine who can access the operating system
- 15. the computer's control program
- 17. the operating system's first line of defense against unauthorized access
- 19. involves trickery that makes a message appear as if it came from an authorized individual or firm when it did not
Down
- 1. HORSE a program whose purpose is to capture IDs and passwords from unsuspecting users
- 2. a secret code entered by the user to gain access to systems, applications, data files or a network server
- 3. an alternative to the centralized model is the concept of
- 7. a program that attaches itself to a legitimate program to penetrate the operating system
- 8. individuals inside or outside the firm who have an interest in the system, but are not end users
- 12. function transcribes transaction data from paper source documents into computer input
- 14. the electronic files produced are later processed by the central computer, which is managed by
- 16. defined generally as any unsolicited e-mail
- 17. a destructive program, such as virus, that is triggered by some predetermined event
- 18. a room adjacent to the computer center that provides safe storage for the off-line data files