CSE - Starter -00

123456789101112
Across
  1. 4. A software or hardware device that monitors incoming and outgoing network traffic, applying rules to allow or disallow certain types of traffic.
  2. 7. A person who attempts to gain unauthorised access to a system.
  3. 9. (5,9) Using software and/or hardware resources that are operated by a third party remotely.
  4. 10. a permanent connection between a component of the IT system and uses dedicated wiring cabling often interchangeable with the term ethernet (802.3) when discussing network connections
  5. 11. (9,6,3) this is the most prevalent wired connection port in today's it landscape; it is a bidirectional bus which means it both transmit and receive on a single Port, each port can connect 127 individual devices acronym USB
  6. 12. a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system, e.g. wiping data.
Down
  1. 1. (4,10,3) ensures that personal data is used responsibly. When designing, developing and/or using information systems, ethical considerations should be made with respect to how the information is collected, processed, stored, used and distributed
  2. 2. (8,9,10) detailed step-by-step guides to how functions should be carried out within an organisation to ensure that they are carried out accurately and in the same way each time.
  3. 3. a wireless (802.15) method often used to connect mice and keyboards as well as audio devices such as headphones and microphones, has a range of 100 meters. Named after a tenth-century King of Denmark and Norway.
  4. 5. (8,8)Locks and keypads for preventing access to computer rooms or storage facilities or to prevent access to storgare areas
  5. 6. misleading individuals or organisations into parting with their confidential and personal data to commit fraud.
  6. 8. An administrative division of a client/server network.