Across
- 8. refers to the security of a computer or computer system
- 9. authentication mechanisms, access channels and systems all have to work properly
- 10. demands a ransom from you to get things back on track.
- 11. result in financial and reputational damage, requiring unplanned and often significant expenditure to recover.
Down
- 1. ensure that information is hidden from people unauthorised to access it.
- 2. modifies other legitimate host files in such a way that when you execute a file in the victim’s system, you also execute the virus.
- 3. helps hackers spy on systems and their users.
- 4. self-replicating and spreads without end-user action, causing real devastation.
- 5. ensuring that data has not been tampered with and, therefore, can be trusted.
- 6. are attempts to expose users to unwanted, potentially malicious advertising.
- 7. malicious instructions that appear as legitimate programs.