Protecting ICT systems

HideShow resource information
R J N E N J D N P W O R A Q M G Y K
A G Y P I O P R C G U X R R T Q C C
C J V J Q T E F J M A Q E V M E M M
C P B C Y B O H A X L K D Y O R T S
E I Y P X G N L Q Y C O P J Q A A N
S I L Q W W W U B E U U E X W W M T
S G K N E A A F H P K N J V L Y T X
R F G D R Q H C T C C J K L N P K J
I J X E L X S K A R P X A P C S H J
G S Y I J U M B Y O G W H S T Y H V
H N E K R Q K P M O E T P Q C M N D
T L R I I E T S S R O N K T H I I O
S X V P D I U W I H Y X V U W U I M
B U J Q O R T F B T N N W N W M B K
S M E N I R O S P S B P N L B D P B
G N U V E J N V G G I D B O Q B Q M
G N V Y J G L L Q N F B N S O I C P
D H T I O G Q Q N I G X P D E M H M

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »