Protecting ICT systems

?
W Q E M Q U S I S Q E R G S J L E M
W F N A S T R B A C K U P I R R V M
Q H C L V Y M T C I I V N E A E R E
N S R W K E M R Y E N T F W L D L R
Y M Y A E H S E U C N L Y V H G W O
Y J P R C F E K A B F P F W L G D H
P U T E I J X C C W S L S X Q V N W
S Y I F L A T E C B B L R G P B F B
B P O J Q I C H E B J A P W S I B T
U Q N D C A S C S S H W A X J O Y Q
I U N N M X U S S K D E I R U X C S
Q D X S S P R U R U Y R R S H S B U
X L M I P E I R I W M I Y W X W I V
N D B T E X V I G V U F W X N S R F
C L P N P U B V H J B Q K T Y M G H
M J R L J E E Q T F E V H P F D T W
N U H R Q X K M S X A L Q W Q R O W
Y K V H N U P W O K N D M N C T A G

Clues

  • a form of data security. ensures data cannot be accessed without a password. (10)
  • a piece of software designed to affect or damage a computer system (7)
  • a piece of software designed to detect and remove viruses (5, 7)
  • a type of security software that prevents a system from being hacked (8)
  • allows users to gather information without being detected from another users computer (7)
  • copies itself within a system and causes damage to data and destroys computer files (5)
  • copies of data and files to prevent the loss of data if the original is damaged (6)
  • permission which is given to a user or to an application to read and edit files on a computer (6, 6)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Protecting ICT systems resources »