Threats and protection of data
- Created by: Ruby Pepper
- Created on: 03-02-15 11:41
O | U | W | C | G | A | G | U | O | K | F | S | B | W | X | W |
N | L | I | W | A | E | O | D | G | X | E | C | M | S | K | X |
U | R | S | O | Y | N | L | I | G | N | J | G | M | G | R | O |
I | M | E | H | K | C | L | J | S | J | V | U | C | A | U | V |
H | A | S | K | C | R | A | E | U | Q | X | G | U | Y | V | M |
R | H | U | B | R | Y | W | U | Q | L | U | N | T | A | L | Q |
Y | M | R | S | M | P | E | I | G | K | D | I | H | V | A | R |
U | Y | I | I | I | T | R | E | J | H | Q | H | R | R | W | C |
O | E | V | W | V | I | I | U | J | R | B | S | E | B | S | J |
L | G | K | P | U | O | F | O | N | E | U | I | A | J | I | R |
F | A | W | M | G | N | J | V | O | K | E | H | T | R | T | R |
E | M | Y | V | F | H | Y | J | R | C | A | P | S | R | K | L |
I | A | T | V | A | B | R | Q | M | A | S | Y | A | U | D | Y |
O | D | O | A | S | X | X | U | L | H | N | F | Y | R | M | T |
H | W | G | H | Y | C | U | R | Y | A | X | E | X | X | P | M |
Y | P | C | N | A | U | S | D | R | W | Q | C | H | Y | B | H |
Clues
- A false email or website trying to trick you. (8)
- It can be caused by floods or fire. (6)
- People who don't have authorised access to your information. (6)
- People who see an unattended computer (7)
- Software that monitors data coming in and out of a network. (8)
- Turning data into a secret code before sending it to the internet or network. (10)
- Unwanted computer programs that try to spread. (7)
Similar ICT resources:
Teacher recommended
Comments
No comments have yet been made