UNit 1 LA C (1)

12345678910111213141516171819202122
Across
  1. 2. (8) - Malicious software designed to damage or disrupt computer systems
  2. 4. (8) - Fraudulent attempt to trick users into revealing personal or financial information
  3. 5. (11,6) - Backup method copying only files changed since the last backup
  4. 6. (8,7) - Surveillance devices used to monitor and protect buildings or systems
  5. 8. (6,3,10) - Security method using a publicly shared key for encryption
  6. 10. (10,10) - Encryption method using separate public and private keys
  7. 11. (6,4) - Copies of files and information kept for recovery if data is lost
  8. 13. (4,8) - Process of restoring lost, damaged or deleted information
  9. 14. (6,2,9,6) - Different permissions given to users to control access to data
  10. 16. (9) - Security systems that monitor and control network traffic entering or leaving a computer
  11. 19. (8,7) - Techniques used to retrieve or restore lost data
  12. 20. (12,6) - Backup method copying files changed since the last full backup
  13. 21. (6,8) - Password using a mixture of letters, numbers and symbols for improved security
  14. 22. (7,6) - Backup stored in a different location to protect against disasters or theft
Down
  1. 1. (10,6) - Unintentional harm caused to systems or data through human error
  2. 3. (10,8) - Programs used to detect, prevent and remove malicious software
  3. 7. (11,7) - Security threats carried out by attackers looking for easy targets
  4. 9. (9,10) - Encryption method using the same key to encrypt and decrypt data
  5. 12. (8,8) - Physical security methods used to protect devices and information
  6. 15. (9) - Secret codes used to gain authorised access to systems and accounts
  7. 17. (10) - Process of converting readable data into coded information for security
  8. 18. (4,6) - Backup method that copies all selected data and files