Across
- 4. The act of securing data so it cannot be read by unauthorized users.
- 8. A program designed to detect, block, and remove malware.
- 9. System The system used for information processing on a computer.
- 10. A device used to connect multiple devices in a network.
- 14. A tool that helps restore a computer system to its previous state.
- 15. The software environment used by a computer system.
- 18. Software used to protect the computer from unauthorized access.
- 19. An attack that takes advantage of vulnerabilities in a network.
Down
- 1. A specialized computer designed to serve a network.
- 2. The term used for a device's "heart" or "brain."
- 3. Type of memory that holds data even after the power is turned off.
- 5. A visual interface in an operating system.
- 6. A collection of data stored digitally.
- 7. A device that outputs hard copy of a document.
- 11. The connection method for wireless internet.
- 12. The process of encoding data to make it unreadable to unauthorized users.
- 13. A type of attack where malicious software takes control of multiple computers.
- 15. The protocol used for secure communication over the internet.
- 16. A basic storage unit on a computer used for saving files.
- 17. A measure to ensure data is not lost in case of an issue.
- 20. Drive The main directory in which all files and programs are stored on a computer.
