Threats and protection of data
- Created by: Ruby Pepper
- Created on: 03-02-15 11:41
I | H | T | U | X | W | S | O | P | Y | T | C | W | G | Y | L |
I | C | Q | I | W | E | P | O | X | Y | U | J | E | M | G | E |
U | B | N | S | S | R | H | N | I | I | Y | T | S | D | I | T |
N | T | R | U | E | F | D | P | L | F | H | U | A | V | C | N |
U | R | R | T | H | R | K | N | Q | I | J | M | A | W | E | J |
K | I | D | G | C | C | W | O | S | O | A | T | S | P | L | S |
V | C | F | X | T | L | V | I | B | G | J | N | P | T | L | H |
X | Y | O | R | H | L | J | T | E | T | D | E | H | T | E | D |
R | F | O | K | R | A | U | P | U | S | W | L | I | K | I | Q |
E | A | W | J | E | W | V | Y | F | E | S | Q | S | G | X | O |
K | S | L | J | A | E | S | R | C | D | M | O | H | P | E | D |
C | O | V | Q | T | R | E | C | C | L | R | S | I | W | D | O |
A | V | S | I | S | I | F | N | F | U | K | A | N | O | S | K |
H | V | X | G | B | F | M | E | L | G | E | L | G | Y | P | L |
R | P | F | P | T | E | R | F | H | J | R | W | O | P | C | U |
Y | P | C | C | K | S | E | W | H | V | C | C | A | C | O | R |
Clues
- A false email or website trying to trick you. (8)
- It can be caused by floods or fire. (6)
- People who don't have authorised access to your information. (6)
- People who see an unattended computer (7)
- Software that monitors data coming in and out of a network. (8)
- Turning data into a secret code before sending it to the internet or network. (10)
- Unwanted computer programs that try to spread. (7)
Similar ICT resources:
Teacher recommended
Comments
No comments have yet been made