Puzzle - 1
Across
- 3. used by attackers to gain access to a computer or a network.
- 5. S/w that automatically displays / downloads material when user is offline
- 6. a basic access control mechanism that allows elements such as email addresses, users, passwords, URLs, etc. through the system, except those explicitly mentioned which are denied access.
- 8. the process of verifying the identity of a user or piece of information and the veracity of information provided.
- 9. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
Down
- 1. A segment of data by an Internet server to the browser that is returned to the browser everytime it accesses the server
- 2. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 3. Badguys in the world of cybercrime. Hackers with criminal intentions
- 4. Completely Automated Public Turing test to tell Computers and Humans Apart
- 7. The core of a computer's operating system that houses the most essential functions of the computer