CW1

1234567891011121314151617181920212223
Across
  1. 1. :Blocks Unauthorised access to networks.
  2. 4. :__________Signals are used to carry message in fibre optic cables
  3. 5. :Address space for IoT
  4. 6. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
  5. 7. :interconnect end devices in a limited area such as a home, school, office building, or campus.
  6. 8. :A machine which asks or start communication.
  7. 9. :Deny or allow packet based on rules.
  8. 10. :All devices can talk to each other.
  9. 12. :Network attack that occurs on the first
  10. 14. :An attack named after greek-trojan war.
  11. 17. :Business and Personal equipment must be protected
  12. 18. :command to go from switch> to switch#
  13. 19. :A powerful machine which answers.
  14. 20. :A Method to connect Business to Internet
  15. 21. :Creates a secure connection for remote workers.
  16. 22. that a vulnerability becomes known.
  17. 23. : An attack which slows down or crashes equipment and programs
Down
  1. 2. :Marks IP address in network diagram
  2. 3. :WANs are in control of _______________.
  3. 5. :Stealing your username and password.
  4. 6. :Access to people inside company only.
  5. 11. :Network Can grow
  6. 13. :Priority Queues
  7. 15. :interconnects networks
  8. 16. :A program to stop virus attack.
  9. 20. Program secretly collecting information.