Key Terms - Security Policies

?
  • Created by: Olivia
  • Created on: 29-04-14 15:28
I M S L S P R R G J F M P E M S G V
W F G I G I X Q G Q B N F Y T P J B
Y K J I F S O N N F Q J R W C U X F
H I L V A L I N R A D I V M D H C G
N T Q R Y K V E X R S U H A I X K R
R C J U C S K Q O K V S I L R U A J
G L E A Q C C W A B C K P L E P S Y
R N H U A K S N S B X M S A S O L U
R K U H E S A G C B P U M W U M R J
D R U M A L T W C A R H C E T J D V
J H A P Y A E H X C L V X R G L E T
W R W S X A R E P K O S E I Q P S A
M M I I W A V V J U I L K F D J I A
G S V X X K I P J P X Q D J L J L Y
V F E N C R Y P T I O N N M L Q K X
X K F J B S S B R U E K G O C U R J
M H W Y Q P M G X O G V S W T H F F
W X L C Y V E O P H E V W S F X C D

Clues

  • A name or number that is used to identify a certain user of the network or system (4, 2)
  • A person who tries to or succeeds in breaking into a secure computer system (6)
  • A piece of software, hardware or both that is able to protect a network from hackers (8)
  • A series of characters chosen by the user that are used to check the identity of the user when they require access to an ICT system (8)
  • Copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (6)
  • The process of assessing the likelihood of certain events happening and estimating the cost of the damage they could cause and what can be done at reasonable cost to eliminate or minimise the risk (4, 8)
  • The process of coding files before they are sent over a network to protect them from hackers. Also the process of coding files stored on a computer so that if the computer is stolen, they cannot be read. (10)
  • The process of trying to break into a secure computer system (7)
  • Uninterruptible Power Supply - a backup power supply (generator and battery) which will keep the computer running should the mains power supply fail (3)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »