Learning Aim B

12345678910111213
Across
  1. 2. Replicates itself in order to spread to other computers.
  2. 5. Allows an attacker to spy on a user’s computer without their consent.
  3. 7. One type of firewall.
  4. 8. A document that sets out rules for system use.
  5. 9. Keeping transmitted data secret.
  6. 11. A type of hacking that sees if a system can withstand an attack.
  7. 13. Reduces a company's productivity.
Down
  1. 1. What a user is allowed to do on a system.
  2. 3. Separates a trusted network from an untrusted network.
  3. 4. The process of making a device more secure.
  4. 6. A person who gets access to a computer system without permission.
  5. 8. Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website.
  6. 10. The fourth action to take after an attack.
  7. 12. A common physical security method.