Threats and protection of data

HideShow resource information
U R T H R E A T S Y D C T T W M
L J D A M A G E G X I O O H T W
D A G U B N N N U S B A E S V F
X A U I W G I G P X E C N S U L
Y A T Q E H Y U W S R U C O M B
W L L A S F D X R U I R R B E M
E R I I Q T O T Y T E W Y E N S
C S H H C G Y R S K F E P E Y W
O P E R U T Y P C V V S T U M O
W V M E F V X A I O H H I Q B J
M D B I U D H R Q N D S O R R I
U U E V G G U Q M Y D H N F Q G
K H Y T J S U F A T X D S B P C
T F C E E L F I R E W A L L D V
O K D S C K O P D J X M Q Q W Y
Y I K T Y Y D K W X T Q T Y G F

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »