Puzzle - 5
Across
- 2. an isolated environment on a network that mimics end-user operating environments.
- 5. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 7. Comprised of any number and variety of interconnected devices
- 8. Refers to a program that is run entirely from the network, without requiring any installation of software on the endpoint device running the program
- 10. a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
Down
- 1. weaknesses in software programs that can be exploited by hackers to compromise computers.
- 3. the process of decoding cipher text to plain text, so it is readable by humans.
- 4. a network security system that filters unsanctioned incoming and outgoing traffic.
- 6. Computing recourses that make it available to access your files and services through the internet from any point in the world.
- 9. malware that spies on the computer to collect information about a product, a company, a person