Across
- 3. A protocol is a set of rules and standards that govern how data is transmitted over a network.
- 5. Malware refers to any malicious software intentionally designed to damage or disrupt computers and networks.
- 9. Nodes are devices that are connected to a network. These can include computers, Servers, Printers, Routers, Switches, and other devices.
- 10. Spyware is designed to secretly monitor and collect personal information, such as login credentials, browsing habits, and financial data, without the user's consent.
Down
- 1. Protecting systems, networks, and data from cyberattacks, unauthorized access, and vulnerabilities.
- 2. Network topology refers to the physical and logical arrangement of nodes on a network.
- 3. It ensures that personal data and information are kept secure and protected from unauthorized access or misuse.
- 4. Cyberethics is a branch of computer technology that defines the best practices that must be adopted by a user when he uses the computer system.
- 6. Ensuring equal access to digital resources and technology for everyone, regardless of socioeconomic status, geographic location, or other barriers.
- 7. A firewall is a security device that is used to monitor and control incoming and outgoing network traffic. Firewalls are used to protect networks from unauthorized access and other security threats.
- 8. Ransomware is malicious software that encrypts a victim's files or locks them out of their system then, demands a ransom to restore access to the data.
- 9. A network is a collection of computers and devices that are connected together to enable communication and data exchange.
