Threats and protection of data

HideShow resource information
A R W O R H S K C G C V H Q H G
W T C R J X J R R P H Y L E E E
A D H R B T O J V I R U S E S N
K R A O N C L N X N Y W H O E T
W S C C K Y T O M M L Y E G B Y
U T K L H V V I F R G J A Y W Y
P A E L O P M T R B Q M U R J L
E E R A V V R P T J A W P S P A
T R H W A J F Y H D S H H L B U
D H W E K U H R S H X A I P L A
X T S R J F S C S Q Q H S R F L
F I O I N T C N Q H J H H K V L
G H N F V Q E E N H N V I W G R
I H C U M A W U B D K D N B C F
B Y K I T F P E A S T F G J I D
W K S A B P J P M K N X P R B H

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »