Module 1 Puzzle
Across
- 3. A small file containing information from a Web site
- 4. A binary piece of data prepared for transmission over a network
- 5. A check of systems security. This usually includes a review of documents, procedures, and system configurations
- 6. A device that separates/connects networks
- 7. Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
- 9. Any software that has a malicious purpose, such as a virus or trojan horse
- 13. A subsection of a network
- 14. A protocol that is part of the TCP/IP suite of protocols, which is
- 17. A hacker term for a person who claims much greater hacking skill than he actually has
- 18. A seven-layer model describing network connnectivity, devices,and protocols
- 19. An Internet address, such as www.facebook.com
Down
- 1. Hackers who hack only for legal/ethical purposes
- 2. A device or software that provides a barrier between your machine or network and the rest of the world
- 3. Confidentiality, Integrity, and Availability
- 5. The process to verify that a user is authorized to access a given resource. This is part of the logon system
- 8. A utility that provides extensive information about a computer’s network connection
- 10. A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
- 11. A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
- 12. The central Internet connection to which Internet Service Providers must ultimately connect
- 15. foundation for most networking and all Internet
- 16. A protocol critical for securing virtual private networks