Across
- 2. Replicates itself in order to spread to other computers.
- 5. Allows an attacker to spy on a user’s computer without their consent.
- 7. One type of firewall.
- 8. A document that sets out rules for system use.
- 9. Keeping transmitted data secret.
- 11. A type of hacking that sees if a system can withstand an attack.
- 13. Reduces a company's productivity.
Down
- 1. What a user is allowed to do on a system.
- 3. Separates a trusted network from an untrusted network.
- 4. The process of making a device more secure.
- 6. A person who gets access to a computer system without permission.
- 8. Emails, texts or phone calls are sent to users commonly pretending to be from a bank or website.
- 10. The fourth action to take after an attack.
- 12. A common physical security method.
