Across
- 3. Distributed ledger technology with cryptographic linking.
- 5. Using scripts or software to perform tasks without manual input.
- 6. Project management method using small, iterative steps.
- 8. Open-source operating system with many distributions.
- 9. Network of malware-infected devices controlled remotely.
- 11. Practice of protecting digital assets from threats.
- 12. Converting data into unreadable code for protection.
- 13. Flooding a network with traffic to disrupt service.
- 15. A sequence of instructions used in software tasks.
- 16. Low-level code interacting directly with hardware.
- 17. On-demand delivery of IT resources over the internet.
- 18. Malware that demands payment to unlock encrypted data.
Down
- 1. Computers mimicking human cognitive functions.
- 2. Professional who interprets data to help decision-making.
- 3. Wireless technology for short-distance device communication.
- 4. Numeric label identifying devices on a network.
- 5. Loss of signal strength in networking cables.
- 7. Attempt to infiltrate digital systems maliciously.
- 10. Developer who creates the visual interface of websites.
- 14. Temporary storage for fast data retrieval.
