NETWORK SECURITY

12345678910111213141516
Across
  1. 3. ORDERED LIST
  2. 5. ENSURES DATA IS ACCURATE. E.G. PRESENCE, FORMAT AND RANGE
  3. 6. MADE SO THAT LOST DATA CAN BE RECOVERED EASILY
  4. 9. ASSIGNED TO EACH USER TO ENSURE THEY ONLY ACCESS PARTICULAR FILES
  5. 12. ATTACHED TO A DOCUMENT OR SPREADSHEET, COPYING ITSELF FROM ONE APPLICATION TO ANOTHER BY INFECTING START UP FILE
  6. 13. WORLDWIDE COMMUNICATION SYSTEM LINKING COMPUTERS IN GEOGRAPHICALLY SEPERATE AREAS
  7. 14. PROGRAM THAT IS SELF REPLICATING AND CAN INFECT A COMPUTER
  8. 15. A USER INTERFACE OF THE APPLICATION WHERE APPS ARE DISPLAYED IN BROWSER
  9. 16. THE START OF ANY WEB PAGE
Down
  1. 1. LIES DORMANT UNTIL A SPECIFIC PIECE OF PROGRAM CODE IS ACTIVATED
  2. 2. WHEN A WEBSITE CONTAINS ELEMENTS THAT ALLOW THE USER TO INTERACT
  3. 4. MALICIOUS PROGRAMS THAT REPLICATE THEMSELVES FROM SYSTEM TO SYSTEM
  4. 7. PROCESSED ON THE WEB SERVER WHEN THE USER REQUESTS INFORMATION
  5. 8. A SECRET SERIES OF CHARACTERS USED TO GAIN ACCESS TO A COMPUTER SYSTEM
  6. 10. WHEN A WEBSITE HAS NO FORM OF INTERACTIVITY
  7. 11. PRIVATE COMMUNICATION SYSTEM WITHIN AN ORGANISATION