ITS2210 Module 1 Crossword
Across
- 2. The central Internet connection to which Internet Service Providers must ultimately connect
- 5. A seven-layer model describing network connectivity, devices, and protocols
- 6. Any software that has a malicious purpose, such as a virus or Trojan horse
- 8. A hacker term for a person who claims much greater hacking skill than he actually has
- 9. Hackers who hack only for legal/ethical purposes
- 11. A device that separates networks
- 12. A protocol critical for securing virtual private networks
- 13. Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
- 14. A check of systems security. This usually includes a review of documents, procedures, and system configurations
- 16. A subsection of a network
- 18. A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
- 20. A protocol that is part of the TCP/IP suite of protocols, which is the foundation for most networking and all Internet communications
Down
- 1. An Internet address, such as www.facebook.com
- 3. A binary piece of data prepared for transmission over a network
- 4. Confidentiality, Integrity, and Availability
- 7. The process to verify that a user is authorized to access a given resource. This is part of the logon system
- 10. A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
- 15. A small file containing information from a Web site
- 17. A device or software that provides a barrier between your machine or network and the rest of the world
- 19. A utility that provides extensive information about a computer’s network connection