System Security

1234567891011
Across
  1. 4. A suite of technologies that can identify unauthorised users of a computer system (7,9)
  2. 5. Software whose purpose is to remove harmful software from your system (4-7)
  3. 7. The process of scrambling data so it can be sent securely over networks (10)
  4. 8. Checking for weaknesses in your own system before a hacker finds them (11,7)
  5. 9. Repeatedly accessing a website in order to prevent genuine users from accessing it (6,2,7)
  6. 10. A generic term to describe any piece of software that is harmful to your computer (7)
  7. 11. A means of hacking that tries every possible password in quick succession (5,5)
Down
  1. 1. Hardware- or software-based security which controls incoming and outgoing network traffic based on a set of rules (8)
  2. 2. When used alongside passwords, these can control what individual users can see and do on a computer system (4,6,6)
  3. 3. The act of gathering information by spoofing trustworthy websites for malicious intent (8)
  4. 6. A set of rules that govern how a network is managed and used (7,8)