Topic 5: Security Polices Part 2

HideShow resource information
W B R D N A H X E X T F B A R
V R I Q I L V Y H M K I E K Q
C I G W A P U B H P Q R F V K
P I V V L S R E O N A O I A Q
D Y G I E O M L D W P T R M Q
R S A R Q F M V T H W B E R V
R C I B I P H F Q A E A W N D
I D V H J A O U K R A C A K G
I D W Y L S I Q A D A K L O P
A O A G L S R E H W S U L R F
K B U V R W I L R A Q P S T O
D B H G S O Y M T R N G R O W
C H F Q E R M B A E F L L I D
L X F J P D V B X E U Q E K A
M G E L U C S K B A Q B R X B

Clues

  • 2.The machines, wiring, and other physical components of a computer or other electronic system. (8)
  • a name or a number that is used to identify a certain user of network or system (4, 2)
  • a piece of software or hardware which protects a network from hackers (9)
  • a series of characters chosen by the user to access files (8)
  • copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
  • The programs and other operating information used by a computer. (8)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »