Topic 5: Security Polices Part 2

HideShow resource information
X D Q K U S V F W L E D M F R
M R V K S Q I N N S J M D I I
D O P X E R S Y O W A W Y N B
S W W E R R K S N A M P S I S
O S C H I X S R W T U L W Y M
F S L A D M Y D K K L V B K A
T A N R V O D M C A I V F R N
W P L D J C E A W C G D B F M
A G J W C Y B E V X B B V Y M
R B L A P D R F R A B U E O B
E L T R J I K N C A X Y X L J
N W E E F M Y P J P G S A U T
A G T T O X W C C H X N P E G
P X C O N W F X Y S P U I C V
I S S H I A Y Q G F S R M F S

Clues

  • 2.The machines, wiring, and other physical components of a computer or other electronic system. (8)
  • a name or a number that is used to identify a certain user of network or system (4, 2)
  • a piece of software or hardware which protects a network from hackers (9)
  • a series of characters chosen by the user to access files (8)
  • copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
  • The programs and other operating information used by a computer. (8)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »