Across
- 4. A method used to encode data during storage or transmission (10)
- 6. It refers to the right of individuals to determine what information is stored about them and how that information will be used.
- 7. The unauthorised accessing of a computer system.
Down
- 1. A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
- 2. A small piece of software that uses computer networks and security holes to replicate itself. (5)
- 3. A type of software used to protect computer systems from viruses.
- 5. Another name for electronic junk mail.
