Across
- 2. Protecting entry points (endpoints) of devices from cybersecurity threats.
- 5. Best practices for IT services management, set by the Information Technology Infrastructure Library.
- 6. Devices such as desktops, laptops, or servers that connect to a network.
- 7. A numerical label used to identify a device on a network.
- 8. A widely used wired network technology for local area networks (LANs).
- 9. A backup that only copies data changes since the last backup.
- 10. A portable storage device that connects via a USB port.
- 14. Cisco term that refers to the connection of people, process, data, and things.
- 16. A set of rules guiding users' behavior to ensure information security.
- 17. Tools used by cybercriminals to take advantage of system vulnerabilities.
Down
- 1. A device or software that blocks unauthorized network traffic.
- 3. Devices connected to the internet that collect and share data.
- 4. A cable connector with holes that plugs into a device's port.
- 9. Cloud service model offering virtual machines and other computing resources.
- 11. A device that connects a computer to an Ethernet network.
- 12. Distributed computing that brings data processing closer to where it is needed to improve response times.
- 13. A program that modifies data or prevents non-matching data from passing through.
- 15. The process of converting data into unreadable code for protection.
- 18. The company providing your internet connection.
