Across
- 2. The process of making data in a computer system unintelligible.
- 4. Any software which has been written with the intent to cause disruption, damage or inconvenience.
- 7. A form of identification and authentication which relies on comparing scans of e.g. your face, fingerprints, eye retina etc with a stored set of information."
- 9. Any system which periodically checks and downloads / updates software to make sure it always has the latest bug fixes and enhancements.
- 14. The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.
- 16. that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 19. A program that appears harmless, but is, in fact, malicious."
- 20. A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
- 21. A group of software policies and written procedures which together help to enhance and maintain the security of data held on a computer network.
- 22. Sending emails purporting to be from reputable companies to induce people to reveal personal information.
- 23. A cyber attack intended to redirect a website's traffic to another, fake site.
- 24. The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
Down
- 1. Testing designed to check the security and vulnerabilities of a system.
- 3. The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- 5. The process by which a user logging into a system can be checked and verified before being given access.
- 6. Allows devices to access, or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.
- 8. A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites."
- 10. that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
- 11. Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.
- 12. A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data."
- 13. A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- 15. Observing a person's private information over their shoulder eg cashpoint machine PIN numbers.
- 17. Any storage media which can easily be removed from a computer thus allowing the transport of data away e.g. Optical Disk, flash / USB pen etc.
- 18. A secret word or phrase that must be used to gain access to a computer / program / interface / system.