Protecting ICT systems

HideShow resource information
S Q O H N U R W Q Y J O I W B X G A
B A C K U P V N A H L O B N T F Y K
R S I A H A D C R G P X X C C Q H J
F E P G P S F V I R U S F Y J A U O
D S X M N V I R U S C H E C K E R I
W T L G J D R C E A X O K N K I F T
P H A M T L E D N P Y S F G X O I V
M G S N B F W Q C F I U M W X H F T
A I P X Q H A K R V J P P C E I T C
F R Y O H L L M Y C U A E W R K Q E
E S W Y U P L U P O I N W L A N M P
I S A I G M L D T Y T L Q J W Q K U
H E R N X B W J I R V U O Q L D E A
F C E S A O A X O C I P L C A Q N K
Y C L H K J D T N S B G A E M E E A
E A D C Y U C H O M T X C U U X E F
N R G A H J Q H X D B V G T A W P J
T B L Q D Y F U N S M Y Q C F I E M

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »