Across
- 2. A collection of multimedia resources accessible via the internet
- 6. Service that enhance security of the data processing systems and the data transfers of an organisation. The services are intended to counter security attacks and they make use of one or more security mechanisms to provide the services
- 7. Small simple network device that allows multiple computers to communicate. They are an inexpensive piece of network equipment often found in home wired networks and small businesses
- 9. Most commonly used type of interface which uses icons and pictures that are easily understood by the user and can be clicked using an input device. They vary between manufactures but are generally seen as the most intuitive way of using a computer giving access to users with different levels of knowledge
- 13. A piece of malicious code that is written by programmers and used to corrupt data and systems it comes in different forms such as Trojans, Logic Bombs and Worms
- 14. The link between the user and the technology that they are using both hardware and software
- 15. Technology that enables instant automatic payment directly from the customers bank account when a debit card is used
Down
- 1. When an organisations computer system is interrupted by some form of disaster including power cuts, Fire, Floods, Terrorist Attacks
- 3. When an employee goes against the company ICT code of practice e.g. Leaving a workstation logging on creating the opportunity for an unauthorised individual to access their account
- 4. When individuals or organisations break the law through using computers to illegally access a computer system e.g. to break in and change the payroll figures on the internal database
- 5. Mechanism that is designed to detect and prevent or recover from a security attack
- 8. Hardware devices that join multiple computers together at the data link network protocol layer
- 10. One of the main defences against online problems from internal and external threats it continually scans for viruses including Trojans and worms and can be set to run at particular times of the day. To be effective it must be kept up to date. there are many free and affordable virus checkers.
- 11. Any action that compromises the security of data held by an organisation
- 12. Acts as a barrier between the public internet and your private computer or network and block threats including some viruses. A firewall is a preventive measure against external threats and is a first line of defence but must be used with care and in conjunction with other security measures to be effective
