Across
- 2. A type of computer virus that is disguised as legitimate software, e.g. a game.
- 4. The process of converting data into a scrambled code, especially to prevent unauthorised access.
- 7. The action or crime of stealing.
- 10. Errors in computer data that occur during writing, reading, storage, transmission, or processing, which can make the original data unreadable. (9,4)
- 11. Deleting by mistake, dropping a piece of hardware and it breaks, knocking over a drink on to a computer. (10,6)
- 12. A type of spyware that records every keystroke made by a computer user. (3,7)
- 14. Software designed to detect and destroy computer viruses. (4,5)
Down
- 1. A secret word or phrase that accompanies a username that is used to gain access to a computer network.
- 3. A network security system, that protects a network from unauthorised access by using rules to control incoming and outgoing network traffic.
- 5. Fires, floods, hurricanes, tornadoes, lightening, earthquakes. (7,8)
- 6. When any computer device or component stops working due to age, poor maintenance or just because it is faulty. (8,7)
- 8. The unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
- 9. A piece of code which is capable of copying itself in order to do harm, such as corrupting the system or destroying data.
- 13. Gaining unauthorized access to data in a system or computer.
- 15. Software that enables a user to obtain covert information about another's computer activities. Think 007.
