Network and Security
Across
- 4. Refers to several types of malicious computer programs that are created to harm computer systems and their users.
- 7. A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
- 8. Any step you take to ward off a threat is called a
- 9. The capacity to provide increasing amounts of computing power, storage, and/or software.
- 12. A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
- 13. Involves luring individuals into entering personal information into a website controlled by the hacker.
- 14. Used to share some of a company’s intranet resources with people outside the organization
- 15. A type of scam that tricks users into following a thief’s orders, such as downloading a fake anti-malware.
- 17. A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
- 18. Speed of data that can be transmitted over a given amount of time.
Down
- 1. Process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
- 2. A type of malware that self-replicates and spreads through computers and networks.
- 3. Weakness that has not been protected against threats.
- 5. Fundamental building block for the storage, retrieval, and analysis of a company’s data.
- 6. The most widely-used standard for local area networks.
- 7. Layout of the cables and devices that connect the nodes of the network
- 9. designed to report activity on your computer to another party.
- 10. Anything that can cause harm.
- 11. Internal version of the internet containing a company's private information
- 16. Communication system physically connected using cables or wireless media.