IT Security

1234567891011121314151617181920212223
Across
  1. 1. : is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods.
  2. 3. : is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data.
  3. 6. : is another thraet for data
  4. 7. : is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
  5. 8. : is a group of two or more computer systems linked together.
  6. 9. : is concerned with the trustworthiness, origin, completeness, and correctness of information as well as the prevention of improper or unauthorized modification of information.
  7. 10. : is a threat for data
  8. 11. : is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
  9. 15. : is using direct observation techniques, such as looking over someone's shoulder, to get information
  10. 16. : is when someone modifies computer hardware or software in a way that alters the creator's original intent.
  11. 17. : is a system whereby individual PCs are connected together within a company or organisation
  12. 19. :can be defined as a legal access of an Internet geek or group in any organization’s online property after their official permission.
  13. 21. : is To move an infected file, such as a virus, into an area where it cannot cause more harm
  14. 23. :is raw facts
Down
  1. 2. : is data prosed in some way
  2. 4. : more threat of data
  3. 5. : as the name implies allows you to connect to other computers over a wider area (i.e. the whole world).
  4. 6. : A type of confidence trick for the purpose of information gathering, fraud, or system access
  5. 12. : is a way to protect personal data
  6. 13. : is a technique of fraudulently obtaining private information
  7. 14. : is a software program designed to provide a user with administrator access to a computer without being detected.
  8. 18. : information that should stay secret stays secret and only those persons authorized to access it may receive access.
  9. 20. : is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from on-line bank accounts.
  10. 22. : is a malware attack that disguises itself as something innocent, such as a computer game, or a YouTube search results page