Across
- 4. software or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activities.
- 5. a way of proving somebody or something is who or what they claim to be.
- 8. (2words)the privacy of personal information, or other information stored on a computer, that should not be accessed by unauthorised parties.
- 9. (2words)Identifying individuals through facial features.
- 10. software that detects and removes spyware programs installed illegally on a user’s computer system.
- 11. the use of encryption keys to make data meaningless without the correct decryption key.
- 12. Comparison of unique patterns for access approval.
- 13. Making data unreadable without proper decoding keys.
- 17. malicious software that seeks to damage or gain unauthorised access to a computer system.
- 19. Internet robots that can take control of computer systems.
- 20. (2words)use of access levels to ensure only authorised users can gain access to certain data.
- 21. (2words)Code activated under specific conditions to carry out harmful tasks.
- 23. Infra-red scan capturing blood vessel patterns for identification.
- 25. redirecting a user to a fake website in order to illegally obtain personal data about the user.
- 26. (3words)altering IP addresses on a DNS server by a ‘pharmer’ or hacker with the intention of redirecting a user to their fake website.
Down
- 1. Unauthorized access to computer systems.
- 2. (3words)laws which govern how data should be kept private and secure.
- 3. rely on the unique characteristics of human beings as part of the password system.
- 6. illegal access to a computer system without the owner’s permission.
- 7. legitimate-looking emails designed to trick a recipient into giving their personal data to the sender of the email.
- 14. (2words)an agreement that allows an individual to use a computer or network server, often requiring a user name and password.
- 15. (2words)methods taken to prevent unauthorised access to data and to recover data if lost or corrupted.
- 16. (2words)hacking done with the sole intent of causing harm to a computer system or user (for example, deletion of files or use of private data to the hacker’s advantage).
- 18. Stand-alone virus replicating and spreading to other computers.
- 22. use of unique human characteristics to identify a user (such as fingerprints or face recognition).
- 24. hacking (2words)hacking used to test the security and vulnerability of a computer system. The hacking is carried out with the permission of the computer system owner.
