Daniel

1234567891011121314
Across
  1. 1. will send multiple requests to the attacked web resource
  2. 7. a collection of instructions and data that tell the computer how to work.
  3. 9. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  4. 11. believed to be responsible for causing substantial damage to the nuclear program of Iran.
  5. 13. Electronic mail is a method of exchanging messages between people using electronic devices
  6. 14. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
  1. 2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. 3. the fraudulent attempt to obtain sensitive information or data,
  3. 4. small collection of genetic code
  4. 5. a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
  5. 6. horse is any malware which misleads users of its true intent
  6. 8. a person who uses computers to gain unauthorized access to data.
  7. 9. computer resource for recording data in a computer storage device
  8. 10. type of malware that spreads copies of itself from computer to computer.
  9. 12. group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.