Network and Security

123456789101112131415161718
Across
  1. 4. Refers to several types of malicious computer programs that are created to harm computer systems and their users.
  2. 7. A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
  3. 8. Any step you take to ward off a threat is called a
  4. 9. The capacity to provide increasing amounts of computing power, storage, and/or software.
  5. 12. A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
  6. 13. Involves luring individuals into entering personal information into a website controlled by the hacker.
  7. 14. Used to share some of a company’s intranet resources with people outside the organization
  8. 15. A type of scam that tricks users into following a thief’s orders, such as downloading a fake anti-malware.
  9. 17. A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
  10. 18. Speed of data that can be transmitted over a given amount of time.
Down
  1. 1. Process of safeguarding against erroneous or duplicate data by checking what is entered and placing restrictions on how the data is entered.
  2. 2. A type of malware that self-replicates and spreads through computers and networks.
  3. 3. Weakness that has not been protected against threats.
  4. 5. Fundamental building block for the storage, retrieval, and analysis of a company’s data.
  5. 6. The most widely-used standard for local area networks.
  6. 7. Layout of the cables and devices that connect the nodes of the network
  7. 9. designed to report activity on your computer to another party.
  8. 10. Anything that can cause harm.
  9. 11. Internal version of the internet containing a company's private information
  10. 16. Communication system physically connected using cables or wireless media.