Protecting ICT systems

HideShow resource information
D W F T O R H I R B K D F S I J U W
I L S R X C B P U W S M V X B S M O
S L A A H J J X U P V X H A G H P K
F A O A Y B B M Y N I K C I P V D U
D W E C Q Q K W P J R K F R O T C L
G E R C J D A C A N U R I T F V L X
X R A E X R D L C P S R A W M I J W
N I W S E D A H F G C Q A F D R Q J
T F L S V C S A U N H O O L T U N W
C L A R K N S F Q D E M O I U S D C
Y A M I H U Q F W P C O V O F H M G
U E M G U B G V N V K P G B W L N L
F O T H E J E V Q W E D V I R R X S
N K O T U X X R A C R Y U A M Y N S
X G L S I T J I X F C D F B A U H M
E N C R Y P T I O N B K P L M O B B
O G A E W Q Q R X U K Y O C E B T O
S P D U T U R I R A C U E I O T M F

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »