Network Security

123456789101112131415
Across
  1. 7. This prevention method protects accounts by asking for something only the user would know.
  2. 12. This threat is when a server is overloaded with requests to disrupt services.
  3. 13. This threat is when someone is manipulated into giving data
  4. 14. This prevention method gets someone to break into the system to find flaws.
  5. 15. This threat uses malicious software to disrupt computer systems.
Down
  1. 1. This prevention method scans files and removes any malware from your computer.
  2. 2. This threat happens when someone watches someone enter personal data.
  3. 3. This prevention method scrambles data that is sent between devices.
  4. 4. This prevention method monitors network traffic.
  5. 5. This prevention method details which users have access to which files.
  6. 6. This threat is when a password is repeatedly guessed.
  7. 8. This threat is when code is entered into web forms to access data behind them.
  8. 9. This prevention method checks if data entered is valid before accepting it.
  9. 10. This prevention method protects the building where the data is stored.
  10. 11. This threat is when someone intercepts data between two devices.