Security and Networking

12345678910111213141516171819202122
Across
  1. 3. Mining New patterns or relationships between data.
  2. 6. A scam that threatens to delete or expose victims stolen data for money.
  3. 7. provides multiple port for connecting nodes.
  4. 9. Term for many types of malicious computer programs that is created to harm users and their computer systems.
  5. 11. Some information sytems are called.
  6. 16. A node on a network that serves as an entrance to another network.
  7. 18. Is a type of computer that is able to continue when problems are present.
  8. 20. Any step taken to ward off a threat.
  9. 21. Allows sharing and communication between devices.
  10. 22. A weakness that's not protected against threats.
Down
  1. 1. system The complex system for acquiring, storing, organizing, using, and sharing data and information.
  2. 2. Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
  3. 4. Information System Software tools that allows managers to gather, organize, and evaluate information.
  4. 5. Is term for infected computers that under control of a hacker.
  5. 8. warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
  6. 10. Assessment Used to identify and examine possible threats.
  7. 12. Anything that causes harm.
  8. 13. The act of gaining someones trust by pretending you are someone else.
  9. 14. Structures that data moves through networks.
  10. 15. Is used to share company resources with individuals not in the organization.
  11. 17. Designed to report activity on your computer to another party.
  12. 19. The most widely used standard for local area networks.