Across |
3. | Used for backups (2 words) (2 Words) |
5. | Series of characters chosen by user to check their identity |
8. | File servers and storage devices networked together to improve security |
9. | Attack on a secure system depriving organisation of some resources (4 words) (4 Words) |
10. | Process of breaking into a secure computer system to steal data |
11. | Type of security preventing access to software |
12. | Type of security restricting access to computer equipment |
13. | A program that replicates itself and can cause malicious damage |
15. | Process of coding files before they are sent over the network |
16. | Allocated by the network manager to individuals (2 words) (2 Words) |
17. | Allow a record of changes to data (2 words) (2 Words) |
18. | A cheap, high storage capacity form of backup (2 words) (2 Words) |