Protecting ICT systems

HideShow resource information
N U G J N P W F O Y N Y V C L Y C D
I I Y D I V I R U S C H E C K E R E
C S J M G B B P K B B R U T I N X W
D G W L A M M P H B G B C U C R R P
W U G C G A S P Y W A R E G D F T X
W R K P F C K F W M A L W A R E I A
B U J U T C Y P G J C J Q S Q J E S
P Q E B T E Q V I R U S D E E O F J
X C J R Q S I A V B N K Q L N G E G
H U N J G S K D W S U M M L C A L V
J N R L X R W X A D T W W A R R T G
O D T A Y I O J I S D E H W Y A U V
Q L S U N G P X D H P G L E P O F X
X F D Q I H M A L Y A N G R T F V W
J J E R W T D K Q D K B U I I F C Q
V N X I V S F J L H O Q J F O U J L
N W V V V I N G Q L N O E U N X E G
W I M U R M P X E B S T V Q P N A P

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »