Security
Across
- 4. A potential for violation of security which exists when there is a circumstance capability action or event that could breach security and cause harm
- 6. A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols,
- 7. A system entity that provides a service in response to requests from other system entities called clients.
- 8. A type of malware that is a form of extortion. It works by encrypting a victim's hard drive denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again
- 9. A hidden self-replicating section of computer software usually malicious logic that propagates by infecting
Down
- 1. a special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device.
- 2. A generic term for a number of different types of malicious code,
- 3. A client computer program that can retrieve and display information from servers on the World Wide Web
- 5. A logical or physical discontinuity in a network to prevent unauthorized access to data or resources
- 6. is whom someone or what something is for example the name by which something is known,