The Tech Behind the desk

1234567891011121314
Across
  1. 3. : Network of infected devices controlled remotely
  2. 7. : Secure connection that hides your IP address (abbr.)
  3. 8. : A small program used to automate tasks
  4. 9. : Temporary storage to speed up access to data
  5. 11. : Standard markup language for creating web pages (abbr.)
  6. 12. : Process of converting data into a code to prevent unauthorized access
  7. 14. : Software programmed into hardware devices
Down
  1. 1. : Process of verifying identity before granting access
  2. 2. : Device that forwards data packets between computer networks
  3. 3. : Copy of data stored separately to prevent loss
  4. 4. : A computer that provides data or services to other computers
  5. 5. : Maximum data transfer rate of a network
  6. 6. : Fraudulent attempt to obtain sensitive information via email
  7. 10. : Security system that monitors and controls incoming and outgoing network traffic
  8. 13. : To find and remove errors in code