Threats and Protection Methods

123456789101112131415
Across
  1. 2. A type of computer virus that is disguised as legitimate software, e.g. a game.
  2. 4. The process of converting data into a scrambled code, especially to prevent unauthorised access.
  3. 7. The action or crime of stealing.
  4. 10. Errors in computer data that occur during writing, reading, storage, transmission, or processing, which can make the original data unreadable. (9,4)
  5. 11. Deleting by mistake, dropping a piece of hardware and it breaks, knocking over a drink on to a computer. (10,6)
  6. 12. A type of spyware that records every keystroke made by a computer user. (3,7)
  7. 14. Software designed to detect and destroy computer viruses. (4,5)
Down
  1. 1. A secret word or phrase that accompanies a username that is used to gain access to a computer network.
  2. 3. A network security system, that protects a network from unauthorised access by using rules to control incoming and outgoing network traffic.
  3. 5. Fires, floods, hurricanes, tornadoes, lightening, earthquakes. (7,8)
  4. 6. When any computer device or component stops working due to age, poor maintenance or just because it is faulty. (8,7)
  5. 8. The unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  6. 9. A piece of code which is capable of copying itself in order to do harm, such as corrupting the system or destroying data.
  7. 13. Gaining unauthorized access to data in a system or computer.
  8. 15. Software that enables a user to obtain covert information about another's computer activities. Think 007.