Computer Management and safe-guarding our data

1234567891011121314151617181920
Across
  1. 1. Name one Madware threat (5)
  2. 3. A software that is specifically designed to install itself without the users knowledge to negativity affect or ‘harm ’a computer system (7)
  3. 5. A collection of programs that are designed to infiltrate a computer and gain the highest levels of privileges(administrator rights) to take control of the infected computer (7)
  4. 8. A form of malware that exploits weakness in an application or operating system in order to spread. (4)
  5. 11. Checking for the correctness of data Data… (10)
  6. 12. Checking for accuracy of data Data… (10)
  7. 14. Creating a backup image of the entire hard drive, including all data and programs, to be used for re-installation in the case of complete hard drive failure Disk… (7)
  8. 15. Hardware or software that monitors the traffic between a computer and the interne t, to safeguard against beaches in security (7)
  9. 17. Name one category of threats to data (11)
  10. 18. Backup schedule whereby backups are made only of new files and files that have changed since the last backup. Resulting in greater backup efficiency (11)
  11. 19. Morden computing makes it easy to ‘crack’ passwords. There is a simple way of scrambling data or text into a new format using a set of rules, name it (9)
Down
  1. 2. This is a form of malware. It can cause relatively minor, annoying problems such as redirecting you to websites you don’t intend going to. (7)
  2. 4. Name another word for ‘fishing for information’ (8)
  3. 6. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry Defensive… (11)
  4. 7. A form of malware disguised as a useful program, but in reality designed to do harm (6)
  5. 9. This acts as a barrier between your computer and the internet (9)
  6. 10. Security based on measurement and identification of unique physical characteristics of a person (17)
  7. 13. The quality of computer is often summarised by the ‘Garbage In, Garbage Out’. Fill in the acronym for this principle (4)
  8. 16. Uninterruptible Power Supply (3)
  9. 20. Redundant Array of Inexpensive/ Independent Disks (4)