Puzzle

12345678910
Across
  1. 3. A protocol is a set of rules and standards that govern how data is transmitted over a network.
  2. 5. Malware refers to any malicious software intentionally designed to damage or disrupt computers and networks.
  3. 9. Nodes are devices that are connected to a network. These can include computers, Servers, Printers, Routers, Switches, and other devices.
  4. 10. Spyware is designed to secretly monitor and collect personal information, such as login credentials, browsing habits, and financial data, without the user's consent.
Down
  1. 1. Protecting systems, networks, and data from cyberattacks, unauthorized access, and vulnerabilities.
  2. 2. Network topology refers to the physical and logical arrangement of nodes on a network.
  3. 3. It ensures that personal data and information are kept secure and protected from unauthorized access or misuse.
  4. 4. Cyberethics is a branch of computer technology that defines the best practices that must be adopted by a user when he uses the computer system.
  5. 6. Ensuring equal access to digital resources and technology for everyone, regardless of socioeconomic status, geographic location, or other barriers.
  6. 7. A firewall is a security device that is used to monitor and control incoming and outgoing network traffic. Firewalls are used to protect networks from unauthorized access and other security threats.
  7. 8. Ransomware is malicious software that encrypts a victim's files or locks them out of their system then, demands a ransom to restore access to the data.
  8. 9. A network is a collection of computers and devices that are connected together to enable communication and data exchange.