Cambridge IGCSE Computing 0.0 / 5 ? ComputingChapter 8 - Security and EthicsIGCSECIE Created by: MFtoeCreated on: 11-05-18 12:17 1038942167 Across 1. Examines traffic between user's computer and public network (8) 2. Pieces of data which allow detection of web pages viewed by a user and store their preferences (7) 6. Breaking into a computer system to steal personal data (7) 7. Malicious code installed on a computer/web server which redirects user to fake websites without their knowledge asking for personal/ financial data (8) 9. Acts as an intermediary between user and web server (5, 6) Down 2. Editing a program source code for a malicious purpose (8) 3. Gathers data by monitoring keys pressed on the user's keyboard (7) 4. Legitimate looking emails sent to users asking for personal/ financial details (8) 8. Hardware faults (4, 5) 10. Uses a secret key only (9, 10)
Comments
No comments have yet been made