Cybersecurity and Networking

12345678910111213141516171819202122232425
Across
  1. 2. (No spaces) Overwhelms a network, server, or website with excessive traffic, making it unavailable to users.
  2. 4. The C in FCAPS
  3. 6. A future event that could negatively impact the project processes or outcome
  4. 9. The A in MFA
  5. 10. A type of malware, encrypts files until a payment is made.
  6. 14. The name of Unit 1, no spaces.
  7. 16. How attackers deceive individuals into revealing sensitive information, usually by email
  8. 20. The act of compromising digital devices and networks through unauthorised access to an account or computer system.
  9. 23. Highly secure as they rely on unique biological traits that are difficult to forge.
  10. 24. the P in FCAPS
  11. 25. Using a legitimate/authorised user's credentials to gain unauthorised access.
Down
  1. 1. The M in MAN
  2. 3. What the "mal" is short for in malware
  3. 5. Sets of rules and formats that define how data is exchanged between devices on a network.
  4. 7. These capture, track and analyse packets sent over a Network.
  5. 8. A strict step by step approach to project management, originates from construction.
  6. 11. A network over a larger area, typically when multiple LANs are connected together.
  7. 12. Server, Switch, hub and router are all examples of this type of device
  8. 13. A hybrid of Bus and Star networks
  9. 15. Ensure compatibility and interoperability among different devices, vendors, and applications.
  10. 17. The I in CIA Triad
  11. 18. Used to describe attacks motivated by ideological or political reasons.
  12. 19. Protects sensitive data by converting it into unreadable code
  13. 21. Act as a barrier between trusted internal networks and untrusted external sources, blocking malicious traffic.
  14. 22. (No spaces) The act of searching for Wi-Fi networks from a moving vehicle.
  15. 24. Stage 3 of the project management lifecycle