CROSSWORD
Across
- 5. It is in Windows operating systems in the central set of settings and information required to run the Windows computer
- 8. Malware that passes information about a computer user’s activities to an external party
- 10. It is a freeware protocol analyzer for Unix that can monitor network traffic on a wire
- 11. The short name, usually meaningful in some way, associated with a particular computer user
Down
- 1. Obtaining services by using someone else’s resources
- 2. A TCP-based, application-layer, Internet Standard protocol for remote login from one host to another
- 3. Process in which network information is aggregated, sorted and correlated to detect suspicious activities
- 4. These are used or shared by attackers before the software developer knows about the vulnerability
- 6. The authorised use of personally owned mobile devices such as smartphones or tablets in the workplace
- 7. It is a technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business
- 8. A Unix term for the interactive user interface with an operating system
- 9. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down)