Across
- 4. A method of gaining unauthorised access to a computer system/network.
- 6. (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
- 7. (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
- 8. (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
- 9. Individuals or organisations that target computer systems/networks illegally.
Down
- 1. Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
- 2. An individual who gains unauthorised access to computer system/network for social or political purposes.
- 3. (5,8) An individual who commits illegal activities using computers and the Internet.
- 5. (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.