Protecting ICT systems

HideShow resource information
M Y A E I A M Q K Y T W W X E T D H
M F A X D V O H P R P L U X F U I E
D W D Q O O U U N E N T G E I Y P E
X V F O I G K F T K C S A N A T L H
A I M U X C I E H C C T L C K D I T
J X N W A J B F F E N H U R N U V Y
C M L B H S E I H H P G D Y D I N O
F G K K U R R A J C R I N P M G E L
I K U R A E N C U S L R X T C B R N
B D I W W U J R C U M S B I D J C N
Q V Y A X N M I R R N S S O U T B A
S P L S P A F H G I X E B N O F D K
S L M C L G P J S V G C O U E I Y Q
D I O W Y F P F N V U C F H R O O G
G F A R L O J P A V E A X X K C N O
Q R G A R E V X C R U L G R V C U T
E O G Y P O Q J G Q P F T F D O W N
V C D O M H B U D U A Q N T H J E K

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »