Protecting ICT systems

HideShow resource information
J D F L N X M A L W A R E I R L Q B
K L L W F Q N J B G N I J I D R G K
P F J R R H O D Q P D U Y M B E V B
S Q D C I N L O K J M I U S W K B J
E F D W E I B K M V L I F E D C X U
T J T W G O M F H E X J D E I E G E
O S P Y W A R E V Q V R X Q H H Y R
E N C R Y P T I O N P H S F I C V S
J A N C F B A C K U P H O B J S O P
A E W U E X G A X U E V D U V U A G
B J T T X O O O R Y X B K O A R T G
S K J B E J E V Y M J I F C C I P K
U S P R L S A G K F S N G E S V M K
R O V V H F I R E W A L L M D N U F
I K A C C E S S R I G H T S C H S W
V C G E L S X V R O B W C Q R X O U
Q N A P Y V K X L F Y L E L U A D M
F F P G L Y O K N D V O L N J U U G

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »