Protecting ICT systems
- Created by: Katie_Cullip
- Created on: 16-05-16 10:07
W | Q | E | M | Q | U | S | I | S | Q | E | R | G | S | J | L | E | M |
W | F | N | A | S | T | R | B | A | C | K | U | P | I | R | R | V | M |
Q | H | C | L | V | Y | M | T | C | I | I | V | N | E | A | E | R | E |
N | S | R | W | K | E | M | R | Y | E | N | T | F | W | L | D | L | R |
Y | M | Y | A | E | H | S | E | U | C | N | L | Y | V | H | G | W | O |
Y | J | P | R | C | F | E | K | A | B | F | P | F | W | L | G | D | H |
P | U | T | E | I | J | X | C | C | W | S | L | S | X | Q | V | N | W |
S | Y | I | F | L | A | T | E | C | B | B | L | R | G | P | B | F | B |
B | P | O | J | Q | I | C | H | E | B | J | A | P | W | S | I | B | T |
U | Q | N | D | C | A | S | C | S | S | H | W | A | X | J | O | Y | Q |
I | U | N | N | M | X | U | S | S | K | D | E | I | R | U | X | C | S |
Q | D | X | S | S | P | R | U | R | U | Y | R | R | S | H | S | B | U |
X | L | M | I | P | E | I | R | I | W | M | I | Y | W | X | W | I | V |
N | D | B | T | E | X | V | I | G | V | U | F | W | X | N | S | R | F |
C | L | P | N | P | U | B | V | H | J | B | Q | K | T | Y | M | G | H |
M | J | R | L | J | E | E | Q | T | F | E | V | H | P | F | D | T | W |
N | U | H | R | Q | X | K | M | S | X | A | L | Q | W | Q | R | O | W |
Y | K | V | H | N | U | P | W | O | K | N | D | M | N | C | T | A | G |
Clues
- a form of data security. ensures data cannot be accessed without a password. (10)
- a piece of software designed to affect or damage a computer system (7)
- a piece of software designed to detect and remove viruses (5, 7)
- a type of security software that prevents a system from being hacked (8)
- allows users to gather information without being detected from another users computer (7)
- copies itself within a system and causes damage to data and destroys computer files (5)
- copies of data and files to prevent the loss of data if the original is damaged (6)
- permission which is given to a user or to an application to read and edit files on a computer (6, 6)
Comments
No comments have yet been made