Protecting ICT systems

HideShow resource information
G N C A P O M X N Q J X Q K H G A J
W R P S J G G N M N B S M E D K Q G
C B A X P G J E N C R Y P T I O N B
S D O C E D P A K Q R D P M O U D I
T F G R R I F Y X U K Y E R F M Y U
H W G Y A B G S A G R I E X A T L W
G N V R W C Y Q S P S K Q E N K V J
I G X S Y A G X F N C L A M I G U L
R T H Y P J J V S E S L S R B A E S
S B I A S E L I H R R A U G A B S W
S G K G A G B C O M N W R B C R M Q
E L I T H U S J A G I E I M K M O R
C S V W L U J L K T B R V R U A H F
C X J Q R B W S V Q P I K M P S D D
A B D I L A T N S J J F O A A R G R
A G V V R C Y F T Y E L U H W K Y B
C K K E J B W N J J P F N M V M K S
J S I E W O E Y W Y L T E W R T G I

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »