Network Security

12345678910
Across
  1. 4. these are attached to a document or spreadsheet and use the macro/ scripting function
  2. 6. this is a self-replicating computer program
  3. 7. regular backups should be made so data can be ___________
  4. 10. these will lie dormant until a specific piece of program code is activated
Down
  1. 1. these are assigned to each user to ensure they may only access certain files
  2. 2. word to describe programs that can steal/ alter data
  3. 3. passwords can be guessed as users _____ passwords
  4. 5. these will prevent unauthorised access to data
  5. 7. where a user can take a copy of a file it is ____ & ____ access
  6. 8. a disaster recovery plan ensures an organisation can continue ________ after a natural disruption
  7. 9. these replicate without the use of a host file