Key Terms - Security Policies 4.0 / 5 based on 1 rating ? ICTPolicies, Security and LegislationA2/A-levelWJEC Created by: OliviaCreated on: 29-04-14 15:28 684231975 Across 1. The process of trying to break into a secure computer system (7) 4. A name or number that is used to identify a certain user of the network or system (4, 2) 5. A piece of software, hardware or both that is able to protect a network from hackers (8) 8. The process of coding files before they are sent over a network to protect them from hackers. Also the process of coding files stored on a computer so that if the computer is stolen, they cannot be read. (10) 9. Uninterruptible Power Supply - a backup power supply (generator and battery) which will keep the computer running should the mains power supply fail (3) Down 2. The process of assessing the likelihood of certain events happening and estimating the cost of the damage they could cause and what can be done at reasonable cost to eliminate or minimise the risk (4, 8) 3. A series of characters chosen by the user that are used to check the identity of the user when they require access to an ICT system (8) 6. Copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (6) 7. A person who tries to or succeeds in breaking into a secure computer system (6)
Comments
No comments have yet been made