Ict internet security by kiesha
Across
- 1. is a unique string of numbers that identifies a device connected to the internet
- 4. malware that appears harmless but can perform malicious actions on an infected device once downloaded or opened
- 6. software is designed to detect, prevent, and remove malware infections on computers and other devices
- 7. Its aim is often to steal sensitive information or gain access to a computer system
- 8. Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system
- 9. A system or collection of systems operating under a consistent security policy that defines the classification, releasability and special handling caveats for data processed within the domain.
- 11. The process of physically damaging media with the intent of making data stored on it inaccessible. To destroy media effectively, only the actual material in which data is stored needs to be destroyed.
- 12. A computer that provides services to users or other systems. For example, a file server, email server or database server.
- 13. when people who have been doing a skilled type of job are replaced by technology requiring operator with less skill, thereby saving the company money
- 16. An agreed standard for secure communication between two or more entities to provide confidentiality, integrity, authentication and non-repudiation of data
- 18. A sequence of characters used for authentication.
- 20. A piece of software designed to remedy security vulnerabilities, or improve the usability or performance of software and ICT equipment.
Down
- 2. system-specific security documentation
- 3. a type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- 5. working fewer hour per week than people usually do
- 10. The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of an adversary finding an exploitable security vulnerability.
- 14. a type of malware that can collect and transmit private user information without the user’s knowledge or consent
- 15. voice over internet protocol
- 17. a type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
- 19. when people change their job by learning the new skill necessary for another job