Vocab Crossword

1234567891011121314151617181920212223
Across
  1. 4. Wireless Internet Service Provider
  2. 7. A proactive protection technology that provides security at the network level.
  3. 8. The public cloud is defined as a multi-tenant environment, where you buy a “server slice” in a cloud computing environment that is shared with a number of other clients or tenants.
  4. 11. Technology that provides the inhabitants of a home with advanced automation systems that provide control over the buildings functions.
  5. 15. Computer software used to prevent, detect and remove malicious software.
  6. 17. The protection of the access to files and data
  7. 18. A cloud computing environment which uses a mix of on-premises, private cloud and public cloud services with orchestration between the two platforms.
  8. 19. The implementation of backups that allow networks to continue operating,even when units fail.
  9. 21. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  10. 22. Cloud platform that can be customized to ones particular needs.
  11. 23. Deriving from or relating to a previously unknown vulnerability to attack in some software.
Down
  1. 1. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing or allow it to pass.
  2. 2. A list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
  3. 3. A device that extends an Ethernet network or a USB connection to another room in the office or office using AC wall outlets.
  4. 5. The specific design of a network that includes the physical components and their functional organization and configuration.
  5. 6. A network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
  6. 9. The practice of allowing the employees of an organization to use their own personal computers, smartphones, or other devices for work purposes
  7. 10. The capability of a network to handle a growing amount of work, or its potential to be enlarged in order to accommodate for growth.
  8. 12. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than on a local server or a personal computer.
  9. 13. Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
  10. 14. The overall performance of a computer network, and how painless the experience is for the user(s)
  11. 16. The phrase used to describe a could computing platform that is implemented within the corporate firewall, under the control of the IT department.
  12. 20. A large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data.