Threats and protection of data

HideShow resource information
G N E J I V E H A G W Q W I F F
H X E V J P X U L W N T F S C H
L W T G H W Y J E J H J M E D O
F D W N P Y F V N R H G I S K C
V T V G W G T T E A Q J F U D O
C B T N R M P A C W C I C R L B
L Y E I C V T K E H R C F I G D
B F G H U S E F H E L F H V K L
Q P A S P R L U W O A F C V Q K
N U M I R B K A M T N O C G K V
V T A H I P L A L Y M O V E B Q
S Q D P J L O H B M K L W A N N
Q E V E T M M W C N H V A M U E
Q R O D O E N C R Y P T I O N I
U H H J S Q Q G P S O F F C G N
D M P U Y A U F I T C Q X Q O R

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »