CGS1000 Review

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
Across
  1. 4. electronic communication
  2. 6. support system for iot devices
  3. 8. unwanted advertising software
  4. 9. value used in encryption
  5. 11. internet protocol address
  6. 12. breaking encryption
  7. 15. method of encryption
  8. 17. malicious software
  9. 18. connected urban systems
  10. 19. self-spreading malware
  11. 24. live online media
  12. 25. encoding information
  13. 26. denial of service attack
  14. 27. connects devices within a network
  15. 29. data unit for transmission
  16. 30. public key algorithm
  17. 31. encrypts files for ransom
  18. 34. communication rules
  19. 35. secure sockets layer
  20. 39. layer two tunneling protocol
  21. 40. circular network topology
  22. 41. rearrangement cipher
  23. 42. computer-related crime
  24. 43. device that detects input
  25. 44. deceptive email attack
  26. 45. personally identifiable information
  27. 49. online interaction platforms
  28. 54. advanced encryption standard
  29. 56. virtual reality
  30. 57. records keystrokes
  31. 59. secure communication methods
  32. 61. simple shift cipher
  33. 62. translates domain names
Down
  1. 1. fixed substitution cipher
  2. 2. connected transportation device
  3. 3. voice over internet protocol
  4. 5. unauthorized data access
  5. 7. self-replicating malware
  6. 10. online buying and selling
  7. 11. personal information
  8. 13. distributing media online
  9. 14. linear network topology
  10. 16. internet of things
  11. 19. wide area network
  12. 20. unknown software vulnerability
  13. 21. protection of digital systems
  14. 22. interconnected computer system
  15. 23. communication via digital spaces
  16. 28. decoding information
  17. 32. connecting with others online
  18. 33. central hub topology
  19. 35. single shared key
  20. 36. local area network
  21. 37. automated home environment
  22. 38. directs data between networks
  23. 46. public and private keys
  24. 47. personal area network
  25. 48. one-way data transformation
  26. 49. secretly monitors activity
  27. 50. confidentiality integrity availability
  28. 51. data encryption standard
  29. 52. connection point in a network
  30. 53. smart household device
  31. 55. many-to-many topology
  32. 58. levels in networking model
  33. 60. tunneling protocol