Across
- 3. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 5. to a large number of recipients.
- 6. An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely
- 7. Irrelevant or inappropriate messages sent on the
- 10. A link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
- 12. incoming and outgoing network traffic.
- 13. A personal website or social media account where a person regularly posts short videos.
- 14. Any piece of equipment that you can physically touch.
- 16. A point where two systems, subject, organizations meet and interact.
Down
- 1. software That enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 2. A network security device that monitors and
- 4. a limited area.
- 7. The programs and other operating information used by a computer.
- 8. the address of a web page
- 9. A number of interconnected computers, machines and operations.
- 11. A local or restricted communications network, especially a private network created using world wide web software.
- 15. A computer network that interconnects computers