IT Security

123456789101112131415161718192021222324
Across
  1. 2. providers: is another thraet for data
  2. 6. engineering:A type of confidence trick for the purpose of information gathering, fraud, or system access
  3. 9. raw facts
  4. 11. Area Network : is a system whereby individual PCs are connected together within a company or organisation
  5. 12. Identity theft and Fraud: is a way to protect personal data
  6. 13. is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
  7. 15. Private Network :is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
  8. 20. that should stay secret stays secret and only those persons authorized to access it may receive access.
  9. 23. hacking:___________ can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
  10. 24. is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
Down
  1. 1. data prosed in some way
  2. 3. is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
  3. 4. is a software program designed to provide a user with administrator access to a computer without being detected.
  4. 5. Area Network: as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  5. 7. backdoor: is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
  6. 8. surfing: is using direct observation techniques, such as looking over someone's shoulder, to get information
  7. 10. is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
  8. 14. individuals: more threat of data
  9. 16. is a threat for data
  10. 17. is To move an infected file, such as a virus, into an area where it cannot cause more harm
  11. 18. is a technique of fraudulently obtaining private information
  12. 19. is when someone modifies computer hardware or software in a way that alters the creator's original intent.
  13. 21. is a group of two or more computer systems linked together.
  14. 22. theft: is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name