The Tech Behind the desk
Across
- 3. : Network of infected devices controlled remotely
- 7. : Secure connection that hides your IP address (abbr.)
- 8. : A small program used to automate tasks
- 9. : Temporary storage to speed up access to data
- 11. : Standard markup language for creating web pages (abbr.)
- 12. : Process of converting data into a code to prevent unauthorized access
- 14. : Software programmed into hardware devices
Down
- 1. : Process of verifying identity before granting access
- 2. : Device that forwards data packets between computer networks
- 3. : Copy of data stored separately to prevent loss
- 4. : A computer that provides data or services to other computers
- 5. : Maximum data transfer rate of a network
- 6. : Fraudulent attempt to obtain sensitive information via email
- 10. : Security system that monitors and controls incoming and outgoing network traffic
- 13. : To find and remove errors in code