Info 2 Key Terms
- Created by: jessicabrown00
- Created on: 21-03-17 13:54
A | C | S | E | K | L | E | Y | E | X | R | B | L | J | W | D | F | S | Y | Y | V |
E | I | B | T | L | O | E | L | G | S | A | C | M | X | I | U | W | W | Y | X | V |
R | R | Q | G | V | C | S | M | A | E | R | O | P | G | D | O | U | J | S | E | H |
A | V | L | R | U | A | G | Y | T | C | D | M | O | C | E | U | F | X | E | P | W |
W | X | I | U | Q | L | N | M | U | U | C | P | U | R | A | H | I | B | C | X | Q |
T | A | N | S | A | A | N | X | O | R | D | U | L | T | R | M | M | S | U | X | U |
F | Y | T | E | I | R | S | T | R | I | D | T | J | L | E | V | L | E | R | D | R |
O | L | E | R | Y | E | I | J | E | T | J | E | E | Y | A | Y | D | C | I | W | J |
S | U | R | I | J | A | R | C | T | Y | J | R | K | B | N | E | O | U | T | O | U |
S | W | N | N | W | N | C | D | U | M | C | N | B | A | E | K | F | R | Y | E | D |
U | Q | E | T | W | E | H | T | P | E | D | E | G | G | T | Y | I | I | A | F | F |
R | I | T | E | F | T | D | T | M | C | E | T | W | S | W | M | F | T | T | C | H |
I | K | P | R | V | W | M | J | O | H | C | W | V | C | O | G | A | Y | T | O | K |
V | S | R | F | Q | O | C | V | C | A | O | O | F | X | R | F | C | S | A | N | J |
I | M | O | A | T | R | N | W | B | N | T | R | L | K | K | S | D | E | C | O | S |
T | R | T | C | B | K | S | C | K | I | S | K | L | W | W | W | U | R | K | U | H |
N | H | O | E | T | L | U | F | X | S | A | I | X | I | A | R | Q | V | N | T | N |
A | T | C | U | S | A | W | H | Y | M | Y | N | D | W | N | H | J | I | W | M | B |
F | M | O | W | J | N | Q | W | B | F | C | G | Q | L | Q | R | H | C | V | C | N |
V | V | L | R | O | W | F | R | O | M | J | I | A | L | L | M | V | E | Q | M | H |
E | P | K | T | F | H | P | Y | D | M | S | G | U | C | R | F | X | U | F | Y | K |
Clues
- A protocol which directs data from one computer to another (8, 8)
- Any action that compromises that security of data held by the organisation (8, 6)
- Continuously scans for viruses, including trojans and worms and can be set to run at particular times of the day (4, 5, 8)
- Covers a large geographical area and could be linked by cables, microwave or satellites (4, 4, 7, 3)
- Linking two or more computing devices together for the purpose of sharing data, communicating,software and peripherals (8, 10)
- Mechanism that is designed to detect, prevent or recover from a security attack (8, 9)
- Service that enhances the security of the data-processing systems and the data transfers of an organisation (8, 7)
- The link between the user and the technology that they are using; involves both hardware and software (4, 9)
- Usually covers a single site and could be linked by the use of cables (5, 4, 7, 3)
- When an organisation's computer system is interrupted by some form of disaster including power cuts, fire, flood and terrorist attack (8, 6)
Comments
No comments have yet been made