Topic 5: Security Polices Part 2

HideShow resource information
N C X H M S G D U K A E M W Q
E O N C P F O E F S A B U T I
M K A D M I K R C T I B G T J
L I M L B R J A P A A T V U E
E E V B C E C W U D K O E A C
R U E B X W P T K R L E T R H
A I R T C A L F C O Q J B K B
W D K H Q L S O A W L S X H Y
D G R F T L J S B S R X H P X
R B J N U S J H W S C J U U P
A M Y U S E R I D A I L C B F
H P P U B R E U H P P C O Y H
F F B L P H T Y D B R B U W C
P M X A D T N G O A L B F P N
Q F Q K C A T T M O Y V D B X

Clues

  • 2.The machines, wiring, and other physical components of a computer or other electronic system. (8)
  • a name or a number that is used to identify a certain user of network or system (4, 2)
  • a piece of software or hardware which protects a network from hackers (9)
  • a series of characters chosen by the user to access files (8)
  • copies of software and data kept so that the data can be recovered should there be a total loss of the ICT system (4, 2)
  • The programs and other operating information used by a computer. (8)

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »