TEST YOUR KNOWLEDGE

12345678910111213
Across
  1. 2. To make a copy of data stored on a computer or server to lessen the potential impact of failure or loss.
  2. 5. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  3. 6. A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others.
  4. 7. A set of programs that tell a computer to perform a task.
  5. 9. A term that describes all forms of malicious software designed to wreak havoc on a computer.
  6. 11. A group of computers, printers and devices that are interconnected and governed as a whole.
  7. 12. Something that could cause harm to a system or organization.
  8. 13. Someone who violates computer security for malicious reasons, kudos or personal gain.
Down
  1. 1. Hardware or software designed to prevent unauthorised access to a computer or network from another computer or network.
  2. 3. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  3. 4. A technique used by hackers to obtain sensitive information.
  4. 8. The recovery of data following computer failure or loss.
  5. 10. A piece of malware that can replicate itself in order to spread the infection to other connected computers.