Across
- 3. Mining New patterns or relationships between data.
- 6. A scam that threatens to delete or expose victims stolen data for money.
- 7. provides multiple port for connecting nodes.
- 9. Term for many types of malicious computer programs that is created to harm users and their computer systems.
- 11. Some information sytems are called.
- 16. A node on a network that serves as an entrance to another network.
- 18. Is a type of computer that is able to continue when problems are present.
- 20. Any step taken to ward off a threat.
- 21. Allows sharing and communication between devices.
- 22. A weakness that's not protected against threats.
Down
- 1. system The complex system for acquiring, storing, organizing, using, and sharing data and information.
- 2. Authentication Its two forms of identification, one being your password and entering a code sent directly to you.
- 4. Information System Software tools that allows managers to gather, organize, and evaluate information.
- 5. Is term for infected computers that under control of a hacker.
- 8. warehouse Is an enormous digital warehouse that contains archived data gathered from multiple databases.
- 10. Assessment Used to identify and examine possible threats.
- 12. Anything that causes harm.
- 13. The act of gaining someones trust by pretending you are someone else.
- 14. Structures that data moves through networks.
- 15. Is used to share company resources with individuals not in the organization.
- 17. Designed to report activity on your computer to another party.
- 19. The most widely used standard for local area networks.
