paper 2

123456789
Across
  1. 4. Attempting to gain access to a computer system that you do not have permission to access
  2. 7. Ensuring that sensitive data is only disclosed to necessary personnel, such as employee records are only processed by staff within the HR department
  3. 8. The right of all people to keep their personal data confidential
  4. 9. The process of scrambling data so it can be securely stored, or sent securely over networks so that it can be understood only by its intended recipient
Down
  1. 1. an assessment of the practicality of a project or system
  2. 2. Collective term for unwanted and damaging software such as viruses, ransomware, worms and Trojan horses
  3. 3. Security measure that controls incoming and outgoing network traffic using a set of rule
  4. 5. Duplicated data to a separate storage media in case the original data is lost
  5. 6. Anyone who has an interest in, or is affected by, the development of a product or the actions of an organisation