IT Newsletter WordSearch #2

1234567891011121314151617
Across
  1. 1. A server that acts as an intermediary between a user and the internet.
  2. 5. A popular web security and performance company protecting websites.
  3. 7. The number of bits transmitted per second in a digital signal.
  4. 9. The process of verifying a user's identity in security systems.
  5. 10. A methodology combining software development and IT operations.
  6. 11. A process of converting data into a fixed-length string for security.
  7. 12. Gains unauthorized access to computer systems for various purposes.
  8. 13. A value used to verify the integrity of data during transmission.
  9. 15. A program that translates source code into machine code.
  10. 16. Software embedded into hardware, often for low-level control functions.
  11. 17. A facility that houses critical IT infrastructure, such as servers.
Down
  1. 1. A cyber scam where attackers trick users into providing sensitive information.
  2. 2. A malicious attempt to gain access to or damage computer systems.
  3. 3. A program that initializes the operating system when a computer starts.
  4. 4. A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
  5. 5. A method of packaging software and dependencies for deployment.
  6. 6. A wired networking technology for local area networks (LANs).
  7. 7. A decentralized and tamper-proof digital ledger technology.
  8. 8. Fake media created by the manipulation of real media by AI.
  9. 14. An architectural approach where applications are built as small, independent services.