Common Threats to Computer Data

1234567891011121314151617181920212223
Across
  1. 3. This piece of the equipment, when used properly with your computer, will prevent your computer from power failure or power surges/spikes.
  2. 6. Second copies of our files are called this and stored on a a separate hard drive (in addition to the computer) to prevetnt against data corruption.
  3. 8. This is a natural disaster that we have had at school during storms, leading to damage of our computer
  4. 9. To prevent against Trojans only open files or run programmes from t_ _ _ _ _ _ sources.
  5. 11. Trojans are often hidden in a_ _ _ _ _ _ _ _ _ s to emails.
  6. 13. Unlike a virus or worm, Malware/Spyware cannot self-r _ _ _ _ _ _ _ _.
  7. 14. Name of a document that contains the rules and expected student behaviour when using IT within a school.
  8. 18. Failure to this part of the computer is usually mechanical such as fan failure leading to overheating and possible disastours consequences for your computer data.
  9. 19. Software that spies on your computer activities and preferences.
  10. 20. A common type of high risk data threat that usually comes via email and involves an attempt to get you to give out personal information through a fake website link.
  11. 21. Name of a person who gains unauthorised access to a computer system to steal/destroy files.
  12. 23. Software intended to damage or disable computer systems
Down
  1. 1. A piece of computer code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  2. 2. Name of a person who gains unauthorised access to a computer system for fun.
  3. 4. This is a type of 'bad' or malicious code that can exist on websites that is set-up to harm computer data or can even infect computers with viruses.
  4. 5. Named after a Greek myth about a horse gifted to a town which had soldiers hidden inside; similarly this is a piece of software that appears to do one thing but actually does another, often hiding a virus or keystroke loggers to copy your passwords.
  5. 7. A machine used to destroy printed copies of electronic documents for security purposes.
  6. 10. The largest group of computer criminals who have easy access to computers and their data.
  7. 12. This type of network is more difficult to control as permissions for machine access are set on each individual machine.
  8. 15. A n_ _ _ _ _ _ connection is when two or more computers are connected to allow sharing of files or devices, even internet connectivity.
  9. 16. The access to machines on a s_ _ _ _ _-based network is controlled from one location, making it more secure to set-up than some other networks.
  10. 17. Closing windows and locking doors to computer rooms is a p_ _ _ _ _ _ _ way to restrict access to computer systems to protect data.
  11. 22. The name of a small file attached to websites that store information in your web browser about your browsing activity on the site and any information you entered into forms.