Across
- 3. Name another word for ‘fishing for information’ (8)
- 7. Name one Madware threat (5)
- 8. Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
- 9. This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
- 11. Checking for the correctness of data Data… (10)
- 15. Security based on measurement and identification of unique physical characteristics of a person (17)
- 17. Uninterruptible Power Supply (3)
- 18. This acts as a barrier between your computer and the internet (9)
- 19. Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
Down
- 1. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
- 2. The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
- 4. Name one category of threats to data (11)
- 5. Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
- 6. A form of malware disguised as a useful program, but in reality designed to do harm (6)
- 7. Checking for accuracy of data Data… (10)
- 10. A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
- 12. Redundant Array of Inexpensive/ Independent Disks (4)
- 13. Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
- 14. A form of malware that exploits weakness in an application or operating system in order to spread. (4)
- 16. A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
