Physical security

1234567891011121314151617181920
Across
  1. 2. – A secret code to protect computers.
  2. 4. – Used to keep computer rooms safe.
  3. 7. – Can be caused by overheating computers.
  4. 9. – Should be locked when not in use.
  5. 11. – A label to identify important ICT items.
  6. 13. – These must be handled safely to avoid damage.
  7. 15. – A camera system used for security monitoring.
  8. 16. – Guidelines that help keep ICT equipment safe.
  9. 18. – A loud sound that warns of danger.
  10. 19. – What we should do to computers when not in use.
  11. 20. – The way to leave safely in an emergency.
Down
  1. 1. – These must be managed properly to prevent tripping.
  2. 3. – Should be locked to keep computers safe.
  3. 5. – Used to watch and record security footage.
  4. 6. – Used to unlock doors and cabinets.
  5. 8. – A card used to enter secure places.
  6. 10. – A motion used to unlock some security doors.
  7. 12. – A person who protects a place.
  8. 14. – The protection of computers and information.
  9. 17. – What we should always be when using ICT equipment.