Network system
Across
- 3. An attempt to use another person's identity to commit a crime.
- 6. a computer network that allows limited access from outside a private network associated with a company.
- 7. a string of characters that allows access to a computer, interface, or system.
- 8. the theoretical amount of data that can be transmitted across a given media.
- 10. the process of verifying that "you are who you say you are"
- 12. role defined for users who have the privileges to use and modify applications, such as databases.
- 15. a piece of software that attaches to the computer
- 16. malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
- 17. defines the type of tasks the user (assigned to this role) can perform on a network. Roles are associated with users.
- 19. the actual amount of data that can be transmitted across a given media relative to the restrictions and resistance of the media.
- 20. contain settings for the network environment, such as desktop configuration and menu options.
Down
- 1. it is a person who gains unauthorized access to a computing device or network.
- 2. local or restricted computer using Internet Protocol technology to share information, operational systems, or computing services within an organization.
- 4. a physical device or application designed to deny incoming or outgoing traffic on a network.
- 5. the removal of the control information of the message once it reaches the destination.
- 9. person responsible for configuring a network system and managing its operation.
- 11. a type of malware that collects user information by tracking the habits of users.
- 13. the lag or length of time that occurs between each point during information transfer.
- 14. the creating and formatting of the data to be sent.
- 18. software that uses computer networks and security holes to replicate itself.