Cybersecurity Unit 1 Lesson 2
Across
- 1. Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
- 3. A small local area network of computers and devices.
- 7. Software that can stop malware from entering a network, computer, or device.
- 8. Stores data that is in use.
- 9. Software that runs on your computer, looking for many different types of malware from many different sources.
- 11. Small text-based bits of information about your browser that a web server saves.
- 12. Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
- 15. All data on a computer.
- 16. The arrangement of the various elements of a network.
- 17. Executable files that are run by users.
- 18. The systematic way to find specific web addresses and web pages.
Down
- 1. A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
- 2. A weakness in a system that allows an attacker to gain unauthorized access.
- 4. A special kind of file that contains other files.
- 5. A file that contains a collection of other files.
- 6. Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
- 10. Computer shared by multiple users across a network.
- 13. An application file that is currently executing (also called running) in the operating system.
- 14. An agreed-upon method for communication.