Crossword 1

12345678910111213141516171819
Across
  1. 3. Ensures the existence of multiple pathways of communication
  2. 4. A form of networking where each computer is a peer
  3. 6. Refers to the newness of an exploit which may be known in the hacker community for days or weeks
  4. 7. Filtering concept where the network denies all activities except for those specified here
  5. 9. When in use, the client workstation converts to thin client status
  6. 12. A utility or device that captures network communications for investigation and analysis
  7. 13. A weakness or flaw in a host, node, or any other infrastructure that a hacker can exploit
  8. 14. Any potential harm to a resource or node on a network
  9. 15. The act of transmitting a protocol across an intermediary network by encapsulating it in another protocol
  10. 16. Acts as a middle man between client and server. Can hide the identity of the client, filter content, perform NAT, and cache content.
  11. 18. The confidence that other users will act in accordance with the organization’s security rules.
Down
  1. 1. Virtual Private Network
  2. 2. Network security service that allows a user to authenticate to an entire domain through a single client log on process
  3. 3. Communication link that enables access to network resources using a WAN link to connect to a distant network
  4. 5. Small home, home office network
  5. 8. The process of purging a storage device by writing zeroes to all addressable locations on the device
  6. 10. Written document prescribing security goals, mission, objectives, standards, procedures, and implementations for a given organization
  7. 11. A computer system that hosts resources accessed by users from clients
  8. 17. Network device responsible for directing traffic towards its stated destination
  9. 19. The likelihood or potential for a threat to take advantage of a vulnerability