Across
- 1. will send multiple requests to the attacked web resource
- 7. a collection of instructions and data that tell the computer how to work.
- 9. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- 11. believed to be responsible for causing substantial damage to the nuclear program of Iran.
- 13. Electronic mail is a method of exchanging messages between people using electronic devices
- 14. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
- 2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 3. the fraudulent attempt to obtain sensitive information or data,
- 4. small collection of genetic code
- 5. a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
- 6. horse is any malware which misleads users of its true intent
- 8. a person who uses computers to gain unauthorized access to data.
- 9. computer resource for recording data in a computer storage device
- 10. type of malware that spreads copies of itself from computer to computer.
- 12. group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes.
