Across
- 2. Malware that is able to distribute itself over a network normally via email
- 5. Fooling a user into giving out confidential data also referred to as ‘Fishing for information’
- 7. Creates a backup image of entire hard drive.
- 10. Collection of programs designed to use administrator rights to gain control of a computer
- 11. backup Backing up of data on a server on the internet with advantages of data synchronising .
- 13. any attempt to manipulate or 'con' soemone into installing malware. This is known as Social________.
- 17. Form of malware that monitors and tracks the way you use your computer to gain confidential information
- 18. Checking the accuracy of data from human perspective known as Data _________.
- 19. Security Security based on measurement and dentification of unique physical characteristics
Down
- 1. Technique of used to make electronic communication seem to come from another person.
- 3. Checking the correctness of data from perspective of computer known as Data _________.
- 4. device that puts a battery and a management system between the computer and the main power supply
- 6. The quality of computer output is often summarised by this principle
- 8. Backup schedule whereby backups are made only of new files and files that have changed since last backup resulting in back up effiency . This is known as ______ backup.
- 9. Program disguised as useful or desirable features
- 12. Technique programmer makes pro active provison for possible errors made by the user this can be reffered to as _________ Programming.
- 14. designed to minimise the possibility of data loss
- 15. Barrier between the computer and the internet
- 16. Simple way of scrambling text or data into a new format using specified rules
- 18. Form of malware that attaches itself to a file
