puzzle game

1234567891011121314151617
Across
  1. 4. Any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  2. 6. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. 8. A term that refers to the grouping of every activity that makes a program available for use and moving that program to the target environment.
  4. 10. Providing a common topic identifier in text and chat messages so they can be searched as a group.
  5. 11. A software system that links topics on the screen to related information and graphics.
  6. 13. Body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  7. 14. A local or restricted communications network, especially a private network created using World Wide Web software.
  8. 15. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  9. 16. The duplication of an object under review in source control so that the same code can be modified by more than one developer in parallel
Down
  1. 1. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  2. 2. The practice of developing software as an interconnected system of several independent, modular services that communicate with each other
  3. 3. The amount of data that can be transferred, such as via a bus or over a networking medium, in a given time period
  4. 5. A Standalone malware computer program that replicates itself in order to spread to other computers.
  5. 7. A testing strategy in which the smallest unit of testable code is isolated from the rest of the software and tested to determine if it functions properly
  6. 9. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  7. 12. A networking standard for very short-in the same place is called?
  8. 13. A way to record the changes to a repository and add a log message to describe the changes that were made
  9. 17. Any software program in which advertising banners are displayed while the program is running.