Threats and protection of data

HideShow resource information
P T T F I R E W A L L F Y T G F
O A J I A G R O H I S P M R S D
E C K U K N C W J J L X I S D V
D B Q Q D I D B X F A A E O T R
B A H K T H M R H K J S U U G P
U L T H E S T O B K U M G H S Y
J N H S N I Y L D R T R K B A X
T U R V C H U F I D E Y E F G H
R I E W R P X V A K U V E N I H
M X A E Y L N F C T D U V S M O
F W T I P O U A O V A W G F A W
E F S X T K H L O C M P C I K P
J S R Q I S G D G E A Y U W T X
P F D T O E T D Q J G Q Q X E C
S R K F N D F V I N E U A G F T
D P V D U M O H X C H E V I V N

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »