Threats and protection of data

?
I H T U X W S O P Y T C W G Y L
I C Q I W E P O X Y U J E M G E
U B N S S R H N I I Y T S D I T
N T R U E F D P L F H U A V C N
U R R T H R K N Q I J M A W E J
K I D G C C W O S O A T S P L S
V C F X T L V I B G J N P T L H
X Y O R H L J T E T D E H T E D
R F O K R A U P U S W L I K I Q
E A W J E W V Y F E S Q S G X O
K S L J A E S R C D M O H P E D
C O V Q T R E C C L R S I W D O
A V S I S I F N F U K A N O S K
H V X G B F M E L G E L G Y P L
R P F P T E R F H J R W O P C U
Y P C C K S E W H V C C A C O R

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »