Across
- 2. is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- 4. the practice of protecting digital information from unauthorized access, corruption, theft, or loss throughout its entire lifecycle, ensuring its confidentiality, integrity, and availability (the CIA Triad) through controls like encryption, access management, and policies, crucial for safeguarding sensitive data and meeting regulations like HIPAA or GDPR
- 6. the process of converting readable data (plaintext) into an unreadable, secret code (ciphertext) using an algorithm and a key, ensuring only authorized users with the correct key can decipher and access the original information, securing sensitive data in transit or at rest
- 8. tools, machinery, and other durable equipment.
- 9. is the application of scientific knowledge for practical purposes, especially in industry.
Down
- 1. the process of developing or being developed.
- 3. A person employed to look after technical equipment or do practical work
- 5. the programs and other operating information used by a computer.
- 7. a network security system, either hardware or software, that acts as a barrier, monitoring and controlling incoming and outgoing network traffic based on set security rules to block unauthorized access and malicious threats, creating a protective wall between a trusted internal network and untrusted external ones like the internet
