Data centres and security

12345678910111213141516171819
Across
  1. 1. It is a process that has completed execution but still has an entry in the process table.
  2. 4. It is a program can collect and transmit personal information, often without the user being aware.
  3. 6. It is a resource intended to provide the customer or end user with information and support related to a company's or institution's products and services.
  4. 8. sections of a centre sealed off from other sections.
  5. 11. It is a secret word or string of characters that is used for user authentication to prove identity.
  6. 12. duplication of equipment in case one part fails.
  7. 18. using physical characteristics for ID.
  8. 19. It is a method of exchanging digital messages from an author to one or more recipients.
Down
  1. 2. It is a collection of internet-connected programs communicating with other similar programs in order to perform tasks.
  2. 3. It is a portable computer with a built-in screen, integrated keyboard, and battery power.
  3. 5. It is a family of computer networking technologies for local area networks.
  4. 7. having different and unconnected cables to a network.
  5. 8. It is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
  6. 9. ability to withstand unexpected problems or setbacks.
  7. 10. It is the process of encoding messages.
  8. 13. time when the equipment is not functioning.
  9. 14. It is a collection of computers interconnected by communication channels that allow sharing of resources and information.
  10. 15. It is an attacker's attack intended to redirect a website's traffic to another, bogus site.
  11. 16. It is a computer worm targeting the Microsoft Windows operating system.
  12. 17. It is the action of recording (or logging) the keys struck on a keyboard.