I.T. Terminology Part 2

123456789101112131415161718
Across
  1. 2. a form of computer storage that can be rewritten multiple times.
  2. 5. when cybercriminals use deception to appear as another person or source of information.
  3. 9. using a person’s unique characteristics to verify their identity, including fingerprint scanning, facial recognition and voice recognition.
  4. 14. a piece of computer hardware that renders graphics on a device.
  5. 15. the method of gaining the trust of a user so that the attacker can acquire sensitive information that can be used to access data.
  6. 16. a string of numbers used to identify devices on the internet or network.
  7. 18. a short-range and contactless form of communication that allows devices to communicate with each other.
Down
  1. 1. an attack that aims to disrupt normal web traffic from accessing a site by flooding a server with internet traffic.
  2. 3. a sequence of instructions used to perform a task in software.
  3. 4. a system of devices that are infected with malware and is controlled by an attacker, sometimes used in DDoS attacks.
  4. 6. an attack that uses email, phone or text to get someone to provide sensitive information such as passwords and credit card information.
  5. 7. the process of identifying problems through a rigorous and repeatable process and then solving those problems using testable methods.
  6. 8. a set of actions aimed to infiltrate computer networks, systems and personal devices.
  7. 10. digital storage used to store temporary files that devices can use for future requests in order to run more efficiently.
  8. 11. a type of cloud computing that provides access to storage, servers, memory, etc.
  9. 12. a large network of information and data that is not tied to a single location.
  10. 13. an extension of a private network over public resources, using dedicated hardware or software to create the extension and securely transmit data.
  11. 17. an open-source operating system used extensively in IT infrastructure.