Across
- 4. Technologies and practices designed to protect nerworks and hardware.
- 7. Delivery of computing services over the internet.
- 9. Digital key used for authentication.
- 11. A service that creates an encrypted connection through a series of servers
- 12. Unique address to indentify a website.
- 13. The maximum rate of data transfer across a network.
- 14. Malicious or harmful software
Down
- 1. Process of finding and fixing code errors.
- 2. A two-symbol numbering scheme.
- 3. Rules for writing code in a programming language.
- 5. A software you use to surf the internet.
- 6. A network security system that monitors incoming outgoing traffic
- 7. The thing every website forces on you.
- 8. A virus or malware hidden in another piece of software
- 10. Unwanted email messages.
- 15. A set of rules allowing different software to communicate with each other.
