Threats and protection of data

HideShow resource information
B S V U C N R M Y K G D B E Y T
R R I L F I R E W A L L G O P Y
J R R W V C W Q R A E A D K H L
Y E U G D C V N C Q M Y R X F I
P K S O Q U E T T A K P B U N T
Q C E Y D R N F D W T Y H U B I
K A S V A V C X M P H S B G K O
P H Y O O S R Q O H R G Y Y J E
O Y J Y E S Y K N I E V U C A Y
F R V I Q L P C W S A P V A T D
E X D G O K T P L H T Q V F K X
H G F W L C I W Q I S O D G G B
R T V C M O O Y I N T K P M M N
I K Q X V B N B Q G X I Y Q K Y
J R F C P O M V Y I W E W F O H
K H M P U C V P M G N C E V X A

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »