Across
- 4. 4. Hardware or software that monitors the traffic between a computer and the internet, to safeguard against breaches in security
- 5. 9. An error is also known as a …
- 6. Array of Inexpensive 1. What does RAID stand for ?
- 10. 1. A water related natural disaster
- 11. worm 4. A form of malware that exploits weakness in an application or operating system in order to spread
- 12. verification 8. Checking for the accuracy of data from a human perspective
- 15. security 9. Security based on measurement and identification of unique physical characteristics of a person, e.g. fingerprints
- 16. Power Supply 10. What does “UPS” stand for ?
- 17. 5. What is the term for ‘fishing for Information’
- 19. 3. It is designed to install itself without the user’s knowledge to negatively affect or ‘harm’ a computer system
Down
- 1. 5. ‘Garbage In, Garbage Out’
- 2. Programming 10. A technique whereby the programmer makes pro-active provision for possible errors made by the user, in the interest of correct data entry
- 3. 7. Volatile memory
- 5. 6. The first line of defence is
- 7. 6. The ‘scrambling’ of text or data according to a specified set of rules to ensure the privacy of data during communication, or for security purposes
- 8. 3. A form of malware disguised as a useful program
- 9. Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
- 13. problems 8. Power outages or power dips are also known as…
- 14. User Interface 2. What does GUI stand for?
- 18. issues 2. A category of threats to data beginning with H
