Cyber Security #2

1234567
Across
  1. 3. someone ot what something is,the name by which something is known.
  2. 4. Hinderence of a system operation by placing excess burden on the performance capabilaties of a system.
  3. 5. Transformaton of data into a form that conceals the datas otininal meaning.
  4. 6. process of updating software to a different version.
  5. 7. Finite step by step insrtuctions for a problem solving or a comutation procedure.
Down
  1. 1. Network point that acts as an entrance to another network. Needs to be protected.
  2. 2. need to ensure that information is disclosed only to those who are authorized to view it.