Protecting ICT systems
- Created by: Katie_Cullip
- Created on: 16-05-16 10:07
A | Y | G | E | S | N | L | G | G | I | M | X | P | W | L | C | U | E |
B | X | S | E | P | H | P | S | V | D | S | T | Q | X | N | V | W | J |
P | G | Y | R | Y | Q | K | I | G | O | F | N | F | D | D | N | T | P |
M | P | F | A | W | V | I | R | U | S | C | H | E | C | K | E | R | V |
I | U | Q | W | A | E | D | H | R | S | R | A | S | Q | E | M | X | L |
N | K | Q | L | R | X | L | V | U | A | C | U | R | I | J | P | D | W |
V | C | G | A | E | R | R | R | J | C | F | L | N | P | J | M | I | N |
E | A | F | M | F | F | I | Y | E | D | S | L | H | K | A | S | F | X |
Y | B | W | D | G | V | K | S | I | X | I | I | R | U | O | F | T | W |
V | C | H | Y | I | B | S | S | A | K | O | C | J | T | I | J | E | O |
S | F | E | N | C | R | Y | P | T | I | O | N | R | R | B | T | V | P |
M | O | A | A | I | R | S | A | A | Y | K | I | E | S | V | F | A | K |
M | M | V | G | Q | X | D | H | X | Y | H | W | I | O | L | A | Y | M |
O | R | H | P | C | E | K | H | B | B | A | D | X | V | L | B | J | O |
E | T | Y | C | X | M | Y | O | A | L | G | B | F | R | A | V | L | T |
S | K | P | S | C | U | O | M | L | B | E | U | D | X | A | L | F | O |
R | V | R | F | W | N | O | B | O | V | R | U | W | Q | C | V | J | R |
F | U | X | N | R | A | H | Q | F | U | Y | P | P | B | H | S | F | I |
Clues
- a form of data security. ensures data cannot be accessed without a password. (10)
- a piece of software designed to affect or damage a computer system (7)
- a piece of software designed to detect and remove viruses (5, 7)
- a type of security software that prevents a system from being hacked (8)
- allows users to gather information without being detected from another users computer (7)
- copies itself within a system and causes damage to data and destroys computer files (5)
- copies of data and files to prevent the loss of data if the original is damaged (6)
- permission which is given to a user or to an application to read and edit files on a computer (6, 6)
Comments
No comments have yet been made