| Across |
| 3. | Used for backups (2 words) (2 Words) |
| 5. | Series of characters chosen by user to check their identity |
| 8. | File servers and storage devices networked together to improve security |
| 9. | Attack on a secure system depriving organisation of some resources (4 words) (4 Words) |
| 10. | Process of breaking into a secure computer system to steal data |
| 11. | Type of security preventing access to software |
| 12. | Type of security restricting access to computer equipment |
| 13. | A program that replicates itself and can cause malicious damage |
| 15. | Process of coding files before they are sent over the network |
| 16. | Allocated by the network manager to individuals (2 words) (2 Words) |
| 17. | Allow a record of changes to data (2 words) (2 Words) |
| 18. | A cheap, high storage capacity form of backup (2 words) (2 Words) |