Cyber Security & Legislation
Across
- 3. Computer ________ Act 1990 - It is illegal to make any unauthorised access to data
- 6. SQL __________ - a technique used to view or change data in a database by inserting additional code into a text input box, creating a different SQL command
- 7. Data ___________ Act 2018 - Data must be adequate, relevant and limited to what is necessary
- 8. __________ Designs & Patents Act 1998 - It is illegal to copy, modify or distribute software, music, videos or other intellectual property without permission from the author
- 9. _________ of Service attack. Floods a server with useless traffic causing the server to become overloaded and unavailable
Down
- 1. Software written in order to infect computers and commit crimes.
- 2. Online fraud technique used by criminals. It is designed to get you to give away personal information
- 4. Brute ________ attack - A trial and error method used to decode encrypted data (such as passwords). Uses every combination until it hits upon the correct one.
- 5. Open ________ - Users can modify and distribute the software. Can be installed on any number of computers. Support provided by the community. May not be fully tested. Users have access to the source code