IT Security

123456789101112131415161718
Across
  1. 3. Person who gains unauthorised access to a computer (6)
  2. 5. Malicious software (7)
  3. 6. Hardware device attached to a computer system (10)
  4. 8. Preventing sensitive information reaching wrong hands (15)
  5. 10. Crime involving a computer and a network (10)
  6. 11. Group of computers involved in malicious activity (6)
  7. 12. Form of identity theft (8)
  8. 14. Area where infected files cannot cause harm (10)
  9. 15. Occurs when someone gains access to resources or benefits in another persons name (8,5)
  10. 17. Person responsible for a network's maintenance (7, 13)
Down
  1. 1. Hardware or software that filters network traffic (8)
  2. 2. Law that protects an individuals privacy (4,10,3)
  3. 4. Manipulating people to act in a certain manner (6,11)
  4. 7. Conversion of data to code to make it safe (10)
  5. 9. Processed data (11)
  6. 13. Wireless technology (9)
  7. 16. Raw unorganised facts (4)
  8. 18. Virus that exists in bootup instructions of a computer (7)