Network system

1234567891011121314151617181920
Across
  1. 3. An attempt to use another person's identity to commit a crime.
  2. 6. a computer network that allows limited access from outside a private network associated with a company.
  3. 7. a string of characters that allows access to a computer, interface, or system.
  4. 8. the theoretical amount of data that can be transmitted across a given media.
  5. 10. the process of verifying that "you are who you say you are"
  6. 12. role defined for users who have the privileges to use and modify applications, such as databases.
  7. 15. a piece of software that attaches to the computer
  8. 16. malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
  9. 17. defines the type of tasks the user (assigned to this role) can perform on a network. Roles are associated with users.
  10. 19. the actual amount of data that can be transmitted across a given media relative to the restrictions and resistance of the media.
  11. 20. contain settings for the network environment, such as desktop configuration and menu options.
Down
  1. 1. it is a person who gains unauthorized access to a computing device or network.
  2. 2. local or restricted computer using Internet Protocol technology to share information, operational systems, or computing services within an organization.
  3. 4. a physical device or application designed to deny incoming or outgoing traffic on a network.
  4. 5. the removal of the control information of the message once it reaches the destination.
  5. 9. person responsible for configuring a network system and managing its operation.
  6. 11. a type of malware that collects user information by tracking the habits of users.
  7. 13. the lag or length of time that occurs between each point during information transfer.
  8. 14. the creating and formatting of the data to be sent.
  9. 18. software that uses computer networks and security holes to replicate itself.