Threats and protection of data

HideShow resource information
D A M A G E E A X X U U X U W X
H Y V A G J P N N V P M S A P S
F M Q V N W F S I L H T L G E E
K J Y J F K E R L A A G W N E G
N H S V L D U A C E E I O R B J
U M B A K S W K R T Q I U Q X D
H O X X E E E H A V T N O B L A
Y B V S R R T W R P B R Q U T W
O N Q I D K J A Y H A S J S S E
A H F H K M F R O I G L I T C N
P D H B P H C C W S P W D U J A
I Q T J B N E J E H M V B L K V
R N X C E P Q B L I X J J O L E
N G P F G W O I B N P A H K M I
K Q V K X G H G S G T X R M C C
C D J B V S O H V F X X W U Q V

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »