Network Security
Across
- 3. Exposes confidential, sensitive, or protected information to an unauthorized person.
- 5. The process of reviewing, analyzing and managing network traffic for any abnormality or process that can affect the network.
- 7. Addresses that are associated with specific devices and assigned to them by the manufacturer.
- 9. The process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
- 10. A network security technology commonly used on Wi-Fi wireless networks that is part of a technology which was designed as a replacement for the older and less secure WEP.
Down
- 1. The process or action of proving or showing something to be true, genuine, or valid:
- 2. Is the overall accuracy, completeness, and consistency of data.
- 4. A security mechanism that identifies people by verifying their physical or behavioral characteristics.
- 6. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- 8. The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious data loss or damage.