Across
- 4. The process of saving data in case it is lost or damaged
- 7. The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
- 10. A type of virus that you think is one thing but is really another thing
- 11. The methods we employ to keep data safe
- 13. a security method where more than one way of determining identity is utilised
- 14. Gaining unauthorised access to a system
- 16. A scam method using email
- 18. A security method where data is put into a code
- 22. The law that says you can have access to any info kept about you
Down
- 1. When an Enterprise has experiences unauthorised access to their data
- 2. Is the data accurate, updated and from a reliable source
- 3. Software that locks your system and you need to pay a few for the code
- 5. The right to keep info about ourselves confidential
- 6. A scam method using SMS
- 8. Where one person pretends to be someone else using confidential information
- 9. landscape The environment in which a system exists and the risks involved in regard to security
- 12. A piece of software designed to block unauthorised access to a system
- 15. The hat colour of a "good" hacker
- 17. Software used to prevent malicious programs from damaging a system
- 19. damage A business may suffer this after a breach
- 20. Security systems that are based on a human feature
- 21. Software designed to damage a system
