Threats and protection of data

HideShow resource information
P A P W J E E R Y A O D F P K K
S J M L S D E P U K H E H K S M
Y K N Q X K I H B U G I T B O L
H V Y N C W O L Y A S L T Y P A
E J C A I N W I M H B C I N K M
V E H F H M M A I Y L S E R G B
I N U E N A D N D L G P S T T V
R C A A M K G P A N S X T O C R
U R V K X C J W O N S R A I C M
S Y A D B F E M X Y H K E P Q H
E P J N X R J P U H I S R X O B
S T B O I U M J J M G B H M X G
N I G F B L P M O O J U T H N A
O O G A J C C B E A C E F E M B
W N V P A Y T S O L O R P L M C
T S T L V A R K S F I X X H N K

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »