Security

12345678910111213141516171819
Across
  1. 5. A trojan appears to be __________ at first site
  2. 7. There are 8/9 different _____________ in the DPA
  3. 8. of the first worms was called the ______ worm
  4. 10. A good password should contain symbols, numbers, uppercase and ____________letters
  5. 11. The only way to ensure you never get malware on your computer is to ______ the internet cable
  6. 12. __________ in emails can contain viruses
  7. 15. Religion and medical records are considered ______________ information
  8. 18. A ____________ examines all the network traffic coming in and going out of your computer
  9. 19. __________ is the process of making an exact copy of the contents of a HD
Down
  1. 1. Malware intended to steal important personal information
  2. 2. The DPA states that business should ________ data once they no longer need it
  3. 3. To prevent loss of data one needs to ___________ frequently
  4. 4. Before accessing an account one needs to enter a _________ and password
  5. 6. To protect yourself from malware you need to install an ____________
  6. 7. The Data ________ Act regulates the use of data for all businesses
  7. 9. A copy of important data should be kept in an ________ location
  8. 11. One should never follow links sent by _______________ or unknown sources
  9. 13. The act of accessing another person's computer without permission
  10. 14. Dropbox is an ___________ storage site
  11. 16. A malicious software that spreads with the intention of corrupting or deleting files
  12. 17. Passwords should always be kept ______