Across
- 4. The act of tricking a network into thinking a device is authorized.
- 5. How to pronounce VLCM?
- 9. A vulnerability that “worms” its way in.
- 10. This type of malware “locks” you out.
- 13. The physical layout of connected devices in a network.
- 15. It blocks unwanted traffic, but it’s not on the road.
- 17. Cybercrime’s furry nemesis.
- 18. AI's decision making model?
- 19. A type of cyberattack that loves your inbox.
Down
- 1. The Internet's butler
- 2. A classic way of saying “Have you tried turning it off and on again?
- 3. The infamous error that turns your PC into a paperweight.
- 4. Email inbox snack?
- 6. Trust is earned, not granted.
- 7. IT strategy where data is processed close to where it’s created.
- 8. The heart of the cloud, rarely seen but always running.
- 11. The backbone of (AI's decision making model?)
- 12. The things in 'Internet of Things'?
- 14. Early 2000s PC brand with roots in the pasture?
- 16. Early Internet connection that cut off your calls.
