BTEC DIT Component 3 Key Terms Crossword

1234567891011121314151617181920212223242526272829
Across
  1. 4. A type of network set up for a specific, immediate purpose such as a personal hotspot.
  2. 6. A method of identifying and protecting an organisation's unique symbols or brand.
  3. 9. Meeting legal obligations through features like screen reader support and alt text.
  4. 10. A period when software updates or maintenance make a digital system unavailable.
  5. 12. A requirement that data stored about an individual must be correct and kept up to date.
  6. 13. A legal right that protects original materials from being used without permission or licensing.
  7. 15. An external threat where a system is attacked for industrial or financial gain.
  8. 16. Visual representations, such as data flow or system maps, used to communicate technical information.
  9. 18. A specific type of malware that restricts access to data until a sum of money is paid.
  10. 19. An attack using emails, texts, or phone calls to trick users into providing data.
  11. 24. The act of gaining unauthorised access to a digital system.
  12. 25. The process of securing a device by reducing its vulnerabilities through specific parameters.
  13. 26. Potential penalties defined in an acceptable use policy if unacceptable behaviour occurs.
  14. 27. The ability to increase or decrease cloud storage by renting or freeing space to save money.
  15. 28. A type of property, such as a trademark or patent, that belongs to an organisation.
Down
  1. 1. The principle that ensures an organisation collects only the information that is specifically needed for a task.
  2. 2. The first action to take after a cyber attack to establish the severity and nature of the breach.
  3. 3. A user access restriction method that uses physical characteristics like fingerprints for authentication.
  4. 5. A form of notation used by organisations to explain processes or the flow of data.
  5. 7. The process of scrambling stored or transmitted data so it can only be read by authorised parties.
  6. 8. Hardware or software used as a data level protection measure to block unauthorised traffic.
  7. 11. Facilitation of a team member's needs through technology to ensure they are not bound by geographical or physical restrictions.
  8. 13. Tools or features within cloud computing that allow multiple people to work together on a single shared file.
  9. 14. The part of a policy where an individual signs or clicks to acknowledge they will abide by the rules.
  10. 17. Small files used to track transactional data and exchange information between services.
  11. 20. The principle that internet service providers should enable access to all content and applications regardless of the source.
  12. 21. A legal method used by organisations to protect their inventions or new processes.
  13. 22. An external threat used to redirect users to a fraudulent website.
  14. 23. A general term for software such as viruses, worms, and botnets designed to damage systems.
  15. 29. A data protection principle stating that processing must be done in a legal and fair manner.