Across
- 2. the amount of data that can be transferred from one point to another in a certain time period
- 4. means that computers and networks are operating and authorized user can access the information they need
- 6. designed to protect systems from unauthorized access in order to preserve data integrity
- 9. an attempt to gain access to a network by posing as an authorized user
- 12. transforms data into a scrambled form call ciphertext
- 13. secure tunnel through the internet
- 14. rules that govern data communication
- 16. this card enables computers to communicate over a network
- 18. the address that allows network traffic to be routed to your desktop
- 19. loss of power in a signal as it travels from the sending device to the receiving device
- 22. short for modulator-demodulator
- 23. should not be written down
- 24. a type of router
- 26. represents a network's physical layout
- 27. a self-propagating program code that is triggered by a specified time or event
Down
- 1. redundant array of independent disks
- 3. this attack floods a network or server with service requests to prevent legitimate users access to the system.
- 5. sent $5 Billion in to identity thieves
- 7. contains code intended to disrupt a computer, network or Web site, and is usually hidden in a popular program
- 8. a type of Trojan program used to release a virus, worm, or other destructive code
- 10. inexpensive way to secure a computer to a desktop or counter
- 11. travels from computer to computer in a network, but id does not usually erase data.
- 15. capturing and recording network traffic
- 17. a programming routine built into a system by its designer or programmer
- 20. sending fraudulent e-mails that seem to come from legitimate sources
- 21. a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet
- 25. network connection device containing software the connects network systems and controls traffic flow between them
