Across
- 1. a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
- 7. a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
- 8. a copy of data that is used if original data is unavailable.
- 10. a scheme that takes money or other valuables from an unsuspecting victim.
- 11. a process in which data is converted to code, in order to prevent unauthorized access.
- 15. a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
- 17. process of copying data from the internet to your computer.
- 19. a communication method that electronic devices use to deliver and receive messages electronically.
- 20. software that hackers use to steal data,damage or destroy computers/computer systems.
Down
- 2. protection of networks,data and devices from criminal use.
- 3. a software used to detect and destroy viruses.
- 4. A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
- 5. this word is short for organization(s) that provides access to the Internet.
- 6. string of characters used to access authorization.
- 9. a set of instructions, data or programs used by computers to operate and execute specific tasks.
- 12. known as the address of a web page.
- 13. a system that changes domain name into IP-addresses.
- 14. advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
- 16. a device that connects two or more packet-switched networks. Uses ip-Addresses.
- 18. authentication method that requires the user to provide more than one verification information.