Threats and protection of data

HideShow resource information
F B J D I H P H I S H I N G S E
I X O V G U W O U K T X O Q K W
R J D T L R Q B U O A X S D V A
E V M T S X V L A D A M A G E V
W H A C K E R Y W D B B B G B M
A T K J V E K J V I R U S E S N
L A Y V H K W I U L K O I J J I
L G C J E N C R Y P T I O N I J
J H M T G S T N X N N I H H Q Y
D U P C C G H X E G V O P A T E
P R G G T F R T T N F H P H N D
U Q G O B M E I F P R W Y Y O I
Y K S L Y I A K I N P C P V S Y
Y U G Y R A T R G C H P I Q G G
V K J B G V S E J N I O B J D Y
F B B J V F J Q M O M I E M C O

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »