Across
- 1. Software designed to harm or exploit any device, service, or network, often by causing damage, stealing information, or gaining unauthorized access.
- 4. A device that forwards data packets between computer networks, directing them to their destination by using routing tables.
- 5. A type of malware that attaches itself to legitimate software or files and spreads to other systems, often causing harm or disruption.
- 8. The process of verifying the identity of a user, device, or system before granting access to resources or services.
- 9. A computer or system that provides services, data, or resources to other computers (clients) over a network.
Down
- 2. The process of converting data into a code or cipher to prevent unauthorized access, ensuring confidentiality during storage or transmissionIP Address A unique numerical label assigned to each device connected to a computer network, used for identification and location addressing.
- 3. A global network of interconnected computer systems that communicate via standardized protocols, enabling access to information, communication, and services.
- 6. A security system that monitors and controls incoming and outgoing network traffic, based on predetermined security rules to protect a network from unauthorized access.
- 7. A family of network technologies used for local area networks (LANs), typically using cables to transmit data between devices.
