data security and integrity

1234567891011121314151617
Across
  1. 2. check – method to check data has been transferred correctly even or odd
  2. 4. software that seeks to damage
  3. 5. method used to ensure entered data is reasonable and meets certain input criteria.
  4. 9. software that detects and removes spyware programs installed
  5. 10. digit additional digit appended to a number to check if entered data is error free.
  6. 12. Reverse process of decryption
  7. 13. the accuracy, completeness and consistency of data.
  8. 15. a way of proving somebody or something is who or what they claim to be.
  9. 16. legitimate-looking emails designed to trick a recipient
  10. 17. method used to calculate a check digit based on modulus division by 11.
Down
  1. 1. software or hardware that is between a computer and externalnetwork that
  2. 3. the privacy of personal information,
  3. 6. verification method used to check if data transferred has been altered
  4. 7. illegal access to a computer system without the owner’s permission.
  5. 8. method used to ensure data is correct by using double entry or visual checks.
  6. 11. use of unique human characteristics to identify a user
  7. 14. methods taken to prevent unauthorised access to data
  8. 16. redirecting a user to a fake website in order to illegally obtain personal data