Cyber Security 0.0 / 5 ? ComputingNetwork SecurityGCSEEdexcel Created by: Mr O AdeniyanCreated on: 10-05-18 16:23 624893157 Across 1. users of a computer system will be given different access rights depending on their role (16) 4. attempt to obtain sensitive information by disguising as a trustworthy source (8) 5. protect (a network or system) from unauthorized access (8) 7. data is scrambled before being sent across a network (10) Down 2. spy’s on users, recording key strokes etc. but do not aim to harm the system – just the user. (7) 3. It quietly runs in the background recording every key you hit. (9) 6. a software that is dedicated to finding and destroying infected files (9) 8. a small program which aim to cause active harm to a computer system. (5) 9. to bring down websites by using up the web server’s resources (4)
Comments
No comments have yet been made