Across
- 4. Re-using components instead of throwing them away
- 6. The processes and technologies designed to protect networks, computers and programs from attack, damage or unauthorised access
- 8. Electronic waste
- 10. Tricking people into breaking security procedures
- 11. Watching people enter passwords or PINS
- 13. Designed to protect creators of books, software, etc from having their work illegally copied
- 14. Misinformation which is spread
Down
- 1. Stealing data as it is passed across a network
- 2. Short for malicious software
- 3. Describes the technology that is carried inside the body
- 5. One who breaks a systems integrity maliciously
- 7. The moral principles which govern attitudes and behaviour
- 9. A method of obscuring data so it cannot be read if it is intercepted
- 12. One who is intensely interested in a computer system