IT Security
Across
- 3. Area Network : as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
- 7. surfing : is using direct observation techniques, such as looking over someone's shoulder, to get information
- 8. hacking :can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
- 9. backdoor : is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
- 13. engineering : A type of confidence trick for the purpose of information gathering, fraud, or system access
- 14. individuals : more threat of data
- 16. : is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
- 17. : is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
- 18. : is data prosed in some way
- 19. : is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page
- 20. providers : is another thraet for data
- 21. : is To move an infected file, such as a virus, into an area where it cannot cause more harm
- 23. theft : is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
Down
- 1. : is a group of two or more computer systems linked together.
- 2. Private Network : is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
- 4. : is a software program designed to provide a user with administrator access to a computer without being detected.
- 5. : is a technique of fraudulently obtaining private information
- 6. :is raw facts
- 8. : is a threat for data
- 10. : is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
- 11. : information that should stay secret stays secret and only those persons authorized to access it may receive access.
- 12. : is when someone modifies computer hardware or software in a way that alters the creator's original intent.
- 15. Area Network : is a system whereby individual PCs are connected together within a company or organisation
- 22. Identity theft and Fraud : is a way to protect personal data