Security igcse

123456789101112
Across
  1. 5. uses a private key and a public key
  2. 9. when the computer asks users if they are sure they want to carry out instructions
  3. 10. a type of software which may track user behavior to display targeted ads based on their interests
  4. 11. one method for avoiding acccidental data loss
  5. 12. an attack on a server designed to deny service coming from multiple computers
Down
  1. 1. sits between the main server and the internet and protects the main server from attacks
  2. 2. programs that collect personal or sensitive data then send them to another device
  3. 3. when an authentic-looking message or email tries to trick you into sending sensitive data
  4. 4. malicious software which tricks you into visiting false websites and giving sensitive data
  5. 6. a program that disguises itself as another programs, when run it deletes and corrupts files
  6. 7. a security technology that monitors a computer’s incoming and outgoing traffic
  7. 8. programs that replicate themselves over and over and fill the computer storage
  8. 9. self-replicating software which can delete and corrupt files