Threats and protection of data

HideShow resource information
A A N V R F S S W J E E E J T S
Y P L M B X L B D X T Y S S W J
J G S H C E Y R V C G T H T O E
O J O I Y B V R G P P L A A R K
V L N O P I H P O H L Y C E F W
A C O T R C U T I A Y J K R T O
P K C U H M D S W W B F E H A B
O G S Q H M H E K S V J R T Q Q
U E X J C I R G M N U I X L E Q
S W T G N I X D H L T I D G J K
H U Q G F C M F P W D S A I D X
E E N C R Y P T I O N M R P T K
K H F M I L X R W G A H Y D F T
A H O M L Y T W U D B S M L V K
O T B V C L P D Q Y G F M B G A
L E M W J O H H V B K P S Q Q P

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »