Chapter 8- BASIC OPERATIVE SYSTEMS
Across
- 2. It is the act of compromising digital devices and networks
- 3. It is a mobile operating system based on a modified version of Linux
- 5. It is an Operating system open source
- 7. It is an Operating system belonging to Microsoft
- 8. Linux version with 350 hacking tools
Down
- 1. It is a weakness in an IT system that can be exploited by an attacker
- 4. It is a network security device that monitors and filters incoming and outgoing network traffic
- 6. It is a Linux distribution based on Debian and composed mostly of free and open source software