Across
- 2. used by attackers to gain access to a computer or a network.
- 3. The core of a computer's operating system that houses the most essential functions of the computer
- 4. S/w that automatically displays / downloads material when user is offline
- 6. the process of verifying the identity of a user or piece of information and the veracity of information provided.
- 8. Completely Automated Public Turing test to tell Computers and Humans Apart
- 9. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
Down
- 1. A segment of data by an Internet server to the browser that is returned to the browser everytime it accesses the server
- 5. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- 7. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- 10. an error, flaw, failure or fault in a computer program or system that causes an unintended code interaction