Network Security
Across
- 4. these are attached to a document or spreadsheet and use the macro/ scripting function
- 6. this is a self-replicating computer program
- 7. regular backups should be made so data can be ___________
- 10. these will lie dormant until a specific piece of program code is activated
Down
- 1. these are assigned to each user to ensure they may only access certain files
- 2. word to describe programs that can steal/ alter data
- 3. passwords can be guessed as users _____ passwords
- 5. these will prevent unauthorised access to data
- 7. where a user can take a copy of a file it is ____ & ____ access
- 8. a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
- 9. these replicate without the use of a host file