Protecting ICT systems

HideShow resource information
R O K V F Q X S J Q C W F A L P K K
F S U T A C C E S S R I G H T S N J
B S G M L E D T L N G X V A M N C M
A K T A C N Y V H B R F Q U R E K F
K V L L L C I P N L K E D L R K G X
H B J W L R M U C S G R J A W V C A
F R O A A Y F K X D P I W Q I S P J
L D D R W P X C X C N Y N R J D I W
W K S E E T S A L Y P B U P V J L Y
G R V J R I C B X S F S I A R J D I
B D G C I O B A X J C B P N D K I N
Q A Q Y F N B G R H V B J W J P N P
H R L H R Y U J E I J M F X P F B D
J X X Q V R R C R H D M N L W V Q I
R N J B Y N K U T N F X X A F I W D
Y P P W R E S A X X M G Y E P P D G
G Y L U R X P G D S B H Q I M V M P
S J R L S R L A K B T S G M R Y Q D

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »