Topic 5: Security Polices Part 2

HideShow resource information
E C B G I B U F O E X R B S W
M S Q U B R T X R R S O E P G
M E P M A H C A D H B R F N R
R I M A V C W K S C A M Q Q L
P B F L F D N L V W J B L C J
J E F N R J L F T V D U D A Q
B C N A E A B F U T U D Q N O
A A H D W B O U S P F G Y H K
D H X E U S Y W P U E I N Y L
J O R J S H J P S B L E P A N
B I M S E J M J O A D I J S R
F D E G R B A C K U P J P X J
C S U F I M P A S S W O R D P
F U W G D F C G M B A I S V S
C B F J R J B Y L E D K P R F

Clues

  • 2.The machines, wiring, and other physical components of a computer or other electronic system. (8)
  • a name or a number that is used to identify a certain user of network or system (4, 2)
  • a piece of software or hardware which protects a network from hackers (9)
  • a series of characters chosen by the user to access files (8)
  • copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
  • The programs and other operating information used by a computer. (8)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »