Threats and protection of data

HideShow resource information
H F R E A T O A K B G U X W E Y
C W E P C J S A B H N J B Q B X
X J J S Y T P F W S O N F E M G
V J P I A I R K W E I C W M D R
W T S E Y J L E G S T R W U P B
A Q R D J G G A V U P E H A H S
J H O R I K R N B R Y K Q R B M
T P H I S H I N G I R C X D Q S
K F M Q P W K R N V C A K A N Q
C G O R C K V P G L N H U M D C
Q Y O L H P E B S F E G H A U C
H D E L F I R E W A L L I G I G
H A W D F G Q E P E Y K U E I J
H U Q Y Q C V T E G Y B S R W R
D V P D F T V J K I L G V G A F
B W S T F L E M C F P U O H X N

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »