U03 - LO1 - Keywords - 1

123456789
Across
  1. 4. A method of gaining unauthorised access to a computer system/network.
  2. 6. (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
  3. 7. (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
  4. 8. (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
  5. 9. Individuals or organisations that target computer systems/networks illegally.
Down
  1. 1. Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
  2. 2. An individual who gains unauthorised access to computer system/network for social or political purposes.
  3. 3. (5,8) An individual who commits illegal activities using computers and the Internet.
  4. 5. (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.