Security

123456789
Across
  1. 4. A potential for violation of security which exists when there is a circumstance capability action or event that could breach security and cause harm
  2. 6. A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols,
  3. 7. A system entity that provides a service in response to requests from other system entities called clients.
  4. 8. A type of malware that is a form of extortion. It works by encrypting a victim's hard drive denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again
  5. 9. A hidden self-replicating section of computer software usually malicious logic that propagates by infecting
Down
  1. 1. a special high-speed storage mechanism. It can be either a reserved section of main memory or an independent high-speed storage device.
  2. 2. A generic term for a number of different types of malicious code,
  3. 3. A client computer program that can retrieve and display information from servers on the World Wide Web
  4. 5. A logical or physical discontinuity in a network to prevent unauthorized access to data or resources
  5. 6. is whom someone or what something is for example the name by which something is known,