Security and Net

12345678910111213141516171819
Across
  1. 4. fundamental building block for the storage, retrieval, and analysis of a company’s data
  2. 7. type of malware that self-replicates and spreads through computers and networks
  3. 10. used to prevent attenuation when packets are traveling long distances
  4. 11. logical layout of the cables and devices that connect the nodes of the network
  5. 15. weakness that has not been protected against threats
  6. 17. is anything that can cause harm
  7. 18. most widely-used standard for local area networks
Down
  1. 1. malicious computer programs that are created to harm computer systems
  2. 2. is a node on a network that serves as an entrance to another network
  3. 3. allows users to communicate and share information between computers
  4. 5. contains only the company’s private information
  5. 6. wireless access point
  6. 8. wide area network (acronym)
  7. 9. may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams
  8. 12. can be used to share some of a company’s intranet resources with people outside the organization
  9. 13. similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it
  10. 14. device that connects two LANs or two segments of the same LAN
  11. 15. type of malware that is attached to a host file and has the ability to replicate, or copy, itself
  12. 16. local area network (acronym)
  13. 19. provides multiple ports for connecting nodes