IT Security
Across
- 3. Person who gains unauthorised access to a computer (6)
- 5. Malicious software (7)
- 6. Hardware device attached to a computer system (10)
- 8. Preventing sensitive information reaching wrong hands (15)
- 10. Crime involving a computer and a network (10)
- 11. Group of computers involved in malicious activity (6)
- 12. Form of identity theft (8)
- 14. Area where infected files cannot cause harm (10)
- 15. Occurs when someone gains access to resources or benefits in another persons name (8,5)
- 17. Person responsible for a network's maintenance (7, 13)
Down
- 1. Hardware or software that filters network traffic (8)
- 2. Law that protects an individuals privacy (4,10,3)
- 4. Manipulating people to act in a certain manner (6,11)
- 7. Conversion of data to code to make it safe (10)
- 9. Processed data (11)
- 13. Wireless technology (9)
- 16. Raw unorganised facts (4)
- 18. Virus that exists in bootup instructions of a computer (7)