General DIT

12345678910
Across
  1. 4. Type of threat posed by someone within an organisation, for example, an employee unintentionally installing a virus
  2. 5. Process of testing a system for vulnerabilities that a hacker could exploit
  3. 7. Spying on governments and businesses to obtain secrets / trade secrets / intellectual property, including access and data theft by hackers
  4. 9. Testing the security of a system by attempting to break into it with the owner's permission - Ethical ________
  5. 10. After an attack, the company needs to ____ – telling stakeholders and authorities (e.g. the ICO) what happened
Down
  1. 1. When a fee is paid to the copyright holder to obtain the right to use or distribute content
  2. 2. What is covered by an AUP – e.g. equipment and data owned by a company
  3. 3. A network of computers infected with malicious software, often responsible for carrying out DDoS attacks and sending spam
  4. 6. Start and end of a flow chart, represented in an oval shape
  5. 8. Term used to describe the moral principles that dictate human behaviour –e.g.this is considered when using/processing personal data