Protecting ICT systems

HideShow resource information
H I Q B V M M T B G N S H U K J G I
W S F R R P L A K B N M Y H B E J C
O X I C Q T C K C C W U U W P D H N
P N U A E K Y P C V F I P R S O G R
L W W N U B M A I P O W I U G X G L
X M O P B M F L M U B P K O E R N V
A C C E S S R I G H T S I E M M U W
H U K N T F E N C R Y P T I O N N Y
M V I R U S C H E C K E R W Y L P C
W H W Y A J U S L A R Y X E L H K J
Q E E R B E C X P E S X R A H M E C
B Q C T I X M X V P D A W S T U P C
I U K Q A W N N Y X W E H P W E V O
V H D O N G E W X L R V I R U S J Y
H H Q W X T A T A I B I D R P K C G
Q L N F C R E M F T O G P Q J Y Y G
I S E P E W W E S U W Y K N I U O A
W Q X D B I P D F V I V H Y L E M D

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »