ITS2210 Module 1 Crossword

1234567891011121314151617181920
Across
  1. 2. The central Internet connection to which Internet Service Providers must ultimately connect
  2. 5. A seven-layer model describing network connectivity, devices, and protocols
  3. 6. Any software that has a malicious purpose, such as a virus or Trojan horse
  4. 8. A hacker term for a person who claims much greater hacking skill than he actually has
  5. 9. Hackers who hack only for legal/ethical purposes
  6. 11. A device that separates networks
  7. 12. A protocol critical for securing virtual private networks
  8. 13. Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
  9. 14. A check of systems security. This usually includes a review of documents, procedures, and system configurations
  10. 16. A subsection of a network
  11. 18. A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
  12. 20. A protocol that is part of the TCP/IP suite of protocols, which is the foundation for most networking and all Internet communications
Down
  1. 1. An Internet address, such as www.facebook.com
  2. 3. A binary piece of data prepared for transmission over a network
  3. 4. Confidentiality, Integrity, and Availability
  4. 7. The process to verify that a user is authorized to access a given resource. This is part of the logon system
  5. 10. A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
  6. 15. A small file containing information from a Web site
  7. 17. A device or software that provides a barrier between your machine or network and the rest of the world
  8. 19. A utility that provides extensive information about a computer’s network connection