a

123456789101112131415161718
Across
  1. 2. , Virus known to spread over GSM-SMS networks.
  2. 4. , Mobile technology that competes with GSM.
  3. 6. , The utilization of algorithms to secure signalling.
  4. 7. , The process of tricking people by changing your apparenet identity.
  5. 8. , Wifi encryption method that is easy to hack
  6. 9. , Trade name for 4G networks
  7. 12. , Modern wireless technology that creates homespots and hotspots.
  8. 14. , Wifi encryption method that is difficult to hack
  9. 16. , Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
  10. 17. , The item inserted into a device which holds an encryption key.
  11. 18. , Mobile technology that uses the TDMA radio signal.
Down
  1. 1. , Type of server resident on a GSM network and utilized to force code onto handsets.
  2. 3. , The process of securing a network appliance or server to protect it against hacking.
  3. 5. , Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
  4. 7. , Method used to physically cut into a cable and steal / divert signal.
  5. 10. , Physical security domain associated with network connections that consist of physical lines.
  6. 11. , Physical security domain associated with internal IT systems. (BSS)
  7. 13. , The identification number assigned to every GSM device.
  8. 14. , Modern wireless technology based on local Microwave Signals
  9. 15. , Attack vector utilized which the target of most fraudster. A ____ domain attack.
  10. 16. , The initals for the internet protocol that secures most mobile networks.