Data Security

1234567891011121314151617181920212223242526
Across
  1. 4. software or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activities.
  2. 5. a way of proving somebody or something is who or what they claim to be.
  3. 8. (2words)the privacy of personal information, or other information stored on a computer, that should not be accessed by unauthorised parties.
  4. 9. (2words)Identifying individuals through facial features.
  5. 10. software that detects and removes spyware programs installed illegally on a user’s computer system.
  6. 11. the use of encryption keys to make data meaningless without the correct decryption key.
  7. 12. Comparison of unique patterns for access approval.
  8. 13. Making data unreadable without proper decoding keys.
  9. 17. malicious software that seeks to damage or gain unauthorised access to a computer system.
  10. 19. Internet robots that can take control of computer systems.
  11. 20. (2words)use of access levels to ensure only authorised users can gain access to certain data.
  12. 21. (2words)Code activated under specific conditions to carry out harmful tasks.
  13. 23. Infra-red scan capturing blood vessel patterns for identification.
  14. 25. redirecting a user to a fake website in order to illegally obtain personal data about the user.
  15. 26. (3words)altering IP addresses on a DNS server by a ‘pharmer’ or hacker with the intention of redirecting a user to their fake website.
Down
  1. 1. Unauthorized access to computer systems.
  2. 2. (3words)laws which govern how data should be kept private and secure.
  3. 3. rely on the unique characteristics of human beings as part of the password system.
  4. 6. illegal access to a computer system without the owner’s permission.
  5. 7. legitimate-looking emails designed to trick a recipient into giving their personal data to the sender of the email.
  6. 14. (2words)an agreement that allows an individual to use a computer or network server, often requiring a user name and password.
  7. 15. (2words)methods taken to prevent unauthorised access to data and to recover data if lost or corrupted.
  8. 16. (2words)hacking done with the sole intent of causing harm to a computer system or user (for example, deletion of files or use of private data to the hacker’s advantage).
  9. 18. Stand-alone virus replicating and spreading to other computers.
  10. 22. use of unique human characteristics to identify a user (such as fingerprints or face recognition).
  11. 24. hacking (2words)hacking used to test the security and vulnerability of a computer system. The hacking is carried out with the permission of the computer system owner.