ICT - Security and Communication

12345678910111213141516171819202122232425
Across
  1. 3. Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
  2. 5. World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
  3. 8. Authentication that relies on certain unique characteristics of human beings.
  4. 10. Refers to the need to respect other user's views and display common courtesy when posting views online.
  5. 11. Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
  6. 13. A cloud where the storage environment where the customer/client and cloud storage provider are different companies
  7. 14. A combination of letters, symbols and numbers that protects a system and allows a user to login.
  8. 17. Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
  9. 18. Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
  10. 19. Uses SMS system of mobile phones to send out fake text messages.
  11. 23. Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
  12. 25. This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
Down
  1. 1. Software that gathers data by monitoring key press on the user/s keyboard.
  2. 2. Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
  3. 4. Used to verify that data comes from a secure and trusted source.
  4. 6. Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
  5. 7. Refers to safety when using the internet like keeping personal data safe.
  6. 9. Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
  7. 12. Web applications or website that allow users to create and edit web pages using any web browser.
  8. 15. A type of protocol that allows data to be sent and received securely over the internet.
  9. 16. The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
  10. 20. The act of gaining unauthorized access to a computer system.
  11. 21. Personal internet journals where the writer will type in their observations and opinions on certain topics.
  12. 22. A cloud where the storage is provided by a dedicated environment behind a company firewall.
  13. 24. Unsolicited email sent over the internet.