Cybersecurity Unit 1 Lesson 2

123456789101112131415161718
Across
  1. 1. Way for a computer to identify specific programs and manage their activity. In an IP address, the port appears after a colon at the end of the address.
  2. 3. A small local area network of computers and devices.
  3. 7. Software that can stop malware from entering a network, computer, or device.
  4. 8. Stores data that is in use.
  5. 9. Software that runs on your computer, looking for many different types of malware from many different sources.
  6. 11. Small text-based bits of information about your browser that a web server saves.
  7. 12. Network device that controls and filters data between networks, either wired or wireless. Acts as a gate between two networks.
  8. 15. All data on a computer.
  9. 16. The arrangement of the various elements of a network.
  10. 17. Executable files that are run by users.
  11. 18. The systematic way to find specific web addresses and web pages.
Down
  1. 1. A representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.
  2. 2. A weakness in a system that allows an attacker to gain unauthorized access.
  3. 4. A special kind of file that contains other files.
  4. 5. A file that contains a collection of other files.
  5. 6. Cybercriminals set up sites similar to those with heavy traffic to try to trick you into revealing sensitive information
  6. 10. Computer shared by multiple users across a network.
  7. 13. An application file that is currently executing (also called running) in the operating system.
  8. 14. An agreed-upon method for communication.