U01 E Protecting data and information 2
Across
- 3. (8,5,8) is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case is encrypting the communication between web applications and servers, such as web browsers loading a website. This can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). Acronym TLS
- 6. is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
- 9. (4,10,3) is the UK's implementation of the General Data Protection Regulation (GDPR). Everyone responsible for using personal data has to follow strict rules called 'data protection principles. They must make sure the information is: used fairly, lawfully and transparently
Down
- 1. (7,2,11,3) provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities.
- 2. (6,7,5) is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers). It prevents hackers from seeing or stealing any information transferred, including personal or financial data. Acronym SSL
- 4. (6,4,7) is a security program used to decrypt and encrypt email and authenticate email messages through digital signatures and file encryption.acronym PGP
- 5. is a computer network security system that restricts internet traffic in to, out of, or within a private network. This software or dedicated hardware-software unit functions by selectively blocking or allowing data packets.
- 7. is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks
- 8. (8,6,3) makes it an offense to make, adapt, supply or obtain articles for use in unlawfully gaining access to computer material or impairing the operation of a computer. Access is defined in the Act as: altering or erasing the computer programme or data. copying or moving the programme or data