Puzzle - 5

12345678910
Across
  1. 2. an isolated environment on a network that mimics end-user operating environments.
  2. 5. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. 7. Comprised of any number and variety of interconnected devices
  4. 8. Refers to a program that is run entirely from the network, without requiring any installation of software on the endpoint device running the program
  5. 10. a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
Down
  1. 1. weaknesses in software programs that can be exploited by hackers to compromise computers.
  2. 3. the process of decoding cipher text to plain text, so it is readable by humans.
  3. 4. a network security system that filters unsanctioned incoming and outgoing traffic.
  4. 6. Computing recourses that make it available to access your files and services through the internet from any point in the world.
  5. 9. malware that spies on the computer to collect information about a product, a company, a person