Protecting ICT systems

?
A Y G E S N L G G I M X P W L C U E
B X S E P H P S V D S T Q X N V W J
P G Y R Y Q K I G O F N F D D N T P
M P F A W V I R U S C H E C K E R V
I U Q W A E D H R S R A S Q E M X L
N K Q L R X L V U A C U R I J P D W
V C G A E R R R J C F L N P J M I N
E A F M F F I Y E D S L H K A S F X
Y B W D G V K S I X I I R U O F T W
V C H Y I B S S A K O C J T I J E O
S F E N C R Y P T I O N R R B T V P
M O A A I R S A A Y K I E S V F A K
M M V G Q X D H X Y H W I O L A Y M
O R H P C E K H B B A D X V L B J O
E T Y C X M Y O A L G B F R A V L T
S K P S C U O M L B E U D X A L F O
R V R F W N O B O V R U W Q C V J R
F U X N R A H Q F U Y P P B H S F I

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »