COMPUTER SECURITY

1234567891011
Across
  1. 1. a check________ is used for error detection in stored data
  2. 2. a type of malware which takes control of another computer and uses it to launch attacks
  3. 5. the term given to any type of entry check which assures that data is of the correct type of format
  4. 6. a type of backup strategy where data is stored simultaneously on 2 identical disk systems
  5. 9. an example of a _______ check is when the month entry can only be indicated from 1 to 12
  6. 11. a type of malware which replaces all or part of a functioning programme
Down
  1. 1. a requirement for data to be accurate and up to date
  2. 3. a type of malware that stays inactive until a condition is met
  3. 4. a type of malware which collects data and transmits it to another system
  4. 7. a check _______ is used for error detection in transmitted data
  5. 8. the practice of setting up bogus websites
  6. 10. the name given to an alternative computer system which can be brought into action if the main one fails, as part of a disaster recovery plan