Threats and protection of data

HideShow resource information
K U M K G Y N R R V N S K G M U
V S J Q J W O F R F S I C P D B
Y G K I H A C K E R V D C U G E
S P D J X K H V H L L V A R K H
G B D C V E F I R E W A L L Y V
E N C R Y P T I O N H N S A Q U
W B G T D L A S Q B O W E T H N
P V B A J E S L P D P M S G X H
V N I P R H T Q O A H P U I L D
C Q W Y G V A E R M I V R G X G
I T P M B F E N H A S I I K K T
V T O R M Q R L P G H E V I I P
P B P Q B O H O V E I V K P E V
V E Y A E U T X P L N F G W U C
D F R H V X B R O C G V D E W O
F H X J U Q E B R V P Y P V L N

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »