Cyber Security

12345678910
Across
  1. 1. A person who tries to gain unauthorised access to a computer.
  2. 7. The software that runs a computer.
  3. 9. To copy a file from the internet onto your computer or device.
  4. 10. A group of interconnected computers/devices.
Down
  1. 2. Illegal terrorist activity carried out online.
  2. 3. Files that are encrypted have been altered using a secret code and are unreadable to unauthorised parties.
  3. 4. Also known as network manager. A person with the responsibility of managing and maintaining the network within an organisation.
  4. 5. Computer code designed to damage a computer system.
  5. 6. The programs, applications and data in a computer system. Any parts of a computer system that aren't physical.
  6. 8. A sequence of logical instructions for carrying out a task. In computing, algorithms are needed to design computer programs.