Protecting ICT systems

HideShow resource information
A D W C C Q T D E L N O J N G P Q Y
C D H T T E U T G D I Q K D R H N J
C S R U T V I R U S C H E C K E R E
E N J J F A B L T G W E E O K J A L
S W N T M I J J F I I W R D C H K E
S W Q C U W O W Q R C T A P Q L X V
R H J V K O T W R E N A W U C L X E
I F R T J D P X W N G F Y K X A H B
G A W V H Y F C W C Y X P C V W T A
H V I R U S J E V R O P S A B E C P
T T B U G S R Y S Y D S V B A R Y R
S O M Y O A L E E P A U I H M I Q S
V T G S W J Q M O T M N K S K F M L
D F M L E M A I R I L G F V A I Q V
Q T A K K M E A C O S O J M J A S B
N M Q W O B T L Y N N F X D V L F Q
C F C P I N Q C M E K M B A Y H I W
N V J B A D V X G E O R W N H H F J

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »