Threats and protection of data

?
O U W C G A G U O K F S B W X W
N L I W A E O D G X E C M S K X
U R S O Y N L I G N J G M G R O
I M E H K C L J S J V U C A U V
H A S K C R A E U Q X G U Y V M
R H U B R Y W U Q L U N T A L Q
Y M R S M P E I G K D I H V A R
U Y I I I T R E J H Q H R R W C
O E V W V I I U J R B S E B S J
L G K P U O F O N E U I A J I R
F A W M G N J V O K E H T R T R
E M Y V F H Y J R C A P S R K L
I A T V A B R Q M A S Y A U D Y
O D O A S X X U L H N F Y R M T
H W G H Y C U R Y A X E X X P M
Y P C N A U S D R W Q C H Y B H

Clues

  • A false email or website trying to trick you. (8)
  • It can be caused by floods or fire. (6)
  • People who don't have authorised access to your information. (6)
  • People who see an unattended computer (7)
  • Software that monitors data coming in and out of a network. (8)
  • Turning data into a secret code before sending it to the internet or network. (10)
  • Unwanted computer programs that try to spread. (7)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Threats and protection of data resources »