Network Security
Across
- 5. any program or code designed to do something on a system or network that you don’t want to have happen.
- 6. software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer system or electric devices
- 9. A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
- 12. Can sustain network operations for only a limited time in the event of an outage.
- 13. Redundant ___ eliminates a single point of power failure.
- 15. a program that has two jobs: to replicate and to activate.
- 17. functions similar to a virus. It replicates exclusively through networks.
- 18. Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
- 19. (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
Down
- 1. occurs when a user identifies himself to the system, and the identity is verified against an authentication database
- 2. Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
- 3. (AUP) states what users are allowed and not allowed to do on the company’s network
- 4. protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
- 7. Provides incremental trunk speeds by combining multiple Fast Ethernet links.
- 8. uses duplication of critical components/devices, increasing the reliability of the system.
- 9. software that detects, prevents, and removes viruses, worms, and other malware from a computer
- 10. diving- when a person goes through the trash in order to find personal information
- 11. - using another person's wireless network without permission.
- 14. the 2nd most common firewall tool ensuring port security through port filtering
- 16. a function of any program that sends information about your system or your actions over the Internet.