Network Security

1234567891011121314151617181920
Across
  1. 9. a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad
  2. 10. Monitors the type of websites visited to generate targeted advertisements
  3. 12. Occurs when a user identifies himself to the system, and the identity is verified against an authentication database.
  4. 13. The process of using or manipulating people inside the network environment to gain access to that network from the outside
  5. 15. Low-level operating trojan horse
  6. 16. A person goes through garbage to find personal information
  7. 17. A virus is a program that has two jobs: to replicate and to activate
  8. 20. Software utility that detects, prevents, and removes viruses, worms, and other malware from a computer
Down
  1. 1. A rogue access point is an unauthorized Wireless Access Point (WAP) installed on the network
  2. 2. after the user is authenticated, he is then granted access to resources or services on the network.
  3. 3. A rogue access point that looks like a legitimate access point
  4. 4. Program or code that does something on a system or network you don’t want happening
  5. 5. Sends information about your system or your actions over the internet
  6. 6. Protects networks from potential attacks from outside your network by filtering packets using a number of methods
  7. 7. An attacker poses as some sort of trusted site
  8. 8. It is a firewall tool that prevents the passage of any TCP or UDP segments or datagrams through any port other than the ones prescribed by the system administrator.
  9. 11. Using another person’s wireless network without permission
  10. 14. When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between those other people.
  11. 18. Embedded on a program file. Once opened, the virus runs automatically wreaking havoc
  12. 19. Similar to a virus, but doesn’t need activation to replicate