Security Issues

?
P T F T P I X W A B P L F X C U W Q X E K
H W R A H I U X Y C O O K I E S P T G H U
B D M O Y Q I B L P D G L W W B K I M I T
O G C V S T V B M I C K G I V U R L K G M
I T S M I H I L S V Y B M X X G I M N X K
B E R B C A V U S H H W E S V I P I Y R L
N Y Q J A C K E T J M H I K N G H N S Q N
K H G A L K I J S U F L E G K S K B S S O
E G M S T E T A N T A H D Q I J X N Q B A
C K M R H R B C S B N B B H G N C V K Y C
S N R X R S A K T J T F P V C E S H O H M
B K W R E H B I I E Q S E A W O D X N F W
V R Q T A N T N D V M M E K P P X Y W R H
T S C H T W B G K K T W V I T P K B N J U
R Y H U S W B N S N B G I O I P F X O U L
D G Q Q R H F B I F D L R M W D S B U U E
Y G I H B Y M E G L L F U E I F S Q G D B
Y A I L C Y W X J A I S S S M T W J W W K
Q M I T P E L N A M R Y E U I D Y P V V G
A K L H A C I N T V V N S C W W Y C Y Y F
D U F N Y U Y H P P O S V H N S Y N T S C

Clues

  • Con which makes people believe an email or text is from a valid organisation so that you give away your username and password (8)
  • Designed to be harmful to digital devices (7)
  • Eg theft, flooding, fire and accidental damage (8, 7)
  • The process of sending unwanted messages to open Bluetooth connections (11)
  • These try to get access to data without permission (7)
  • Using these makes it easier for others to gain access to your accounts (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Health and Safety resources »