Across
- 2. check – method to check data has been transferred correctly even or odd
- 4. software that seeks to damage
- 5. method used to ensure entered data is reasonable and meets certain input criteria.
- 9. software that detects and removes spyware programs installed
- 10. digit additional digit appended to a number to check if entered data is error free.
- 12. Reverse process of decryption
- 13. the accuracy, completeness and consistency of data.
- 15. a way of proving somebody or something is who or what they claim to be.
- 16. legitimate-looking emails designed to trick a recipient
- 17. method used to calculate a check digit based on modulus division by 11.
Down
- 1. software or hardware that is between a computer and externalnetwork that
- 3. the privacy of personal information,
- 6. verification method used to check if data transferred has been altered
- 7. illegal access to a computer system without the owner’s permission.
- 8. method used to ensure data is correct by using double entry or visual checks.
- 11. use of unique human characteristics to identify a user
- 14. methods taken to prevent unauthorised access to data
- 16. redirecting a user to a fake website in order to illegally obtain personal data
