Across
- 2. Hash me D8578edf8458ce06fbc5bb76a58c5ca4
- 4. a method, often secret, of bypassing normal authentication in a product
- 8. I am a database design which enables the storage and querying of data outside the traditional structures found in relational databases.
- 9. network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- 10. The Cloud Platform that CNA Hardy have chosen
- 11. a Deployment Model which is a combination of a Private and a Public Cloud
- 13. unique name by performing a wide variety of automated tasks on behalf of their master
- 14. is the computer's main circuit board.
- 15. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- 1. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- 3. malicious computer program which is used to hack into a computer by misleading users of its true intent
- 5. Encrypt the word alphabet using a Caesar cipher with a shift of 3
- 6. what does the P stand for in PaaS
- 7. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information
- 12. A group of networked computers that share a common address (.edu, .com).
