paper 2
Across
- 4. Attempting to gain access to a computer system that you do not have permission to access
- 7. Ensuring that sensitive data is only disclosed to necessary personnel, such as employee records are only processed by staff within the HR department
- 8. The right of all people to keep their personal data confidential
- 9. The process of scrambling data so it can be securely stored, or sent securely over networks so that it can be understood only by its intended recipient
Down
- 1. an assessment of the practicality of a project or system
- 2. Collective term for unwanted and damaging software such as viruses, ransomware, worms and Trojan horses
- 3. Security measure that controls incoming and outgoing network traffic using a set of rule
- 5. Duplicated data to a separate storage media in case the original data is lost
- 6. Anyone who has an interest in, or is affected by, the development of a product or the actions of an organisation