Across
- 4. A network of computers and devices that are centrally governed, usually by your workplace.
- 6. The clicky thing used to navigate your desktop. Sometimes lacking a tail.
- 9. The individual identifying number used by all electronic devices that are connected to a network.
- 12. What you do when there is any kind of computer or internet problem. (2wds)
- 14. Where the sound comes from. You probably can't see yours.
- 15. The moment a hacker successfully exploits a vulnerability to gain access to a system or information.
- 17. The fraudulent practice of attempting to acquire sensitive data.
- 19. The programs that computers use. Like nice, warm pajamas.
- 20. What displays your workstation. You'd be blind without it.
Down
- 1. The general term for computer viruses.
- 2. You use this to correctly input your password.
- 3. The global computer network that provides a variety of uses for people of all ages.
- 5. This is the primary way social engineering intrusions occur.
- 7. A form of malware that prevents access to files or systems until a price is paid.
- 8. A standard safety precaution used to store sensitive information in case of emergency.
- 10. A software improvement that helps prevent possible vulnerabilities.
- 11. An algorithmic technique used to protect sensitive information by making the information unreadable by outside forces.
- 13. The term used for your internet service provider.
- 16. Physical electronic devices and peripherals.
- 18. This technology allows users to access their information from anywhere in the world.
