Protecting ICT systems

HideShow resource information
F K W K Y Y O F I K E G V C P P G S
A H C U Q T K J L X I M N F D L C I
J X G T H D G E Y U J P O L R C W D
X O R F Y A C C E S S R I G H T S X
B R P H V J N P B K N S T S E B C N
S H Y F V A U M I C A P P P R G T W
E E P N I N H P T R L Y Y U A E M P
U I P V N N S C G O L W R H W L D Q
K I R F P K O R X V U A C C L H J J
V I R U S C H E C K E R N Q A F W V
L D N X X P I H E G O E E I M H Q T
A F O E U X I M D F I R E W A L L I
U L G K V D R B N J Y O S X C B P S
G G C O G A S D L U I G C C V K J M
O A S B O K J J H B V H V I R U S S
B A F B O H C R Y X V C I C H R S H
X O Y S V L J X O A V J T U H A U E
L A X K X H Y J Q R S O B P A K W U

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »