CROSSWORD

1234567891011
Across
  1. 5. It is in Windows operating systems in the central set of settings and information required to run the Windows computer
  2. 8. Malware that passes information about a computer user’s activities to an external party
  3. 10. It is a freeware protocol analyzer for Unix that can monitor network traffic on a wire
  4. 11. The short name, usually meaningful in some way, associated with a particular computer user
Down
  1. 1. Obtaining services by using someone else’s resources
  2. 2. A TCP-based, application-layer, Internet Standard protocol for remote login from one host to another
  3. 3. Process in which network information is aggregated, sorted and correlated to detect suspicious activities
  4. 4. These are used or shared by attackers before the software developer knows about the vulnerability
  5. 6. The authorised use of personally owned mobile devices such as smartphones or tablets in the workplace
  6. 7. It is a technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business
  7. 8. A Unix term for the interactive user interface with an operating system
  8. 9. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down)