IT Crossward

123456789101112131415161718
Across
  1. 2. Protecting entry points (endpoints) of devices from cybersecurity threats.
  2. 5. Best practices for IT services management, set by the Information Technology Infrastructure Library.
  3. 6. Devices such as desktops, laptops, or servers that connect to a network.
  4. 7. A numerical label used to identify a device on a network.
  5. 8. A widely used wired network technology for local area networks (LANs).
  6. 9. A backup that only copies data changes since the last backup.
  7. 10. A portable storage device that connects via a USB port.
  8. 14. Cisco term that refers to the connection of people, process, data, and things.
  9. 16. A set of rules guiding users' behavior to ensure information security.
  10. 17. Tools used by cybercriminals to take advantage of system vulnerabilities.
Down
  1. 1. A device or software that blocks unauthorized network traffic.
  2. 3. Devices connected to the internet that collect and share data.
  3. 4. A cable connector with holes that plugs into a device's port.
  4. 9. Cloud service model offering virtual machines and other computing resources.
  5. 11. A device that connects a computer to an Ethernet network.
  6. 12. Distributed computing that brings data processing closer to where it is needed to improve response times.
  7. 13. A program that modifies data or prevents non-matching data from passing through.
  8. 15. The process of converting data into unreadable code for protection.
  9. 18. The company providing your internet connection.