PHN001
Across
- 3. The process of securing a network appliance or server to protect it against hacking.
- 6. Physical security domain associated with internal IT systems. (BSS)
- 7. The utilization of algorithms to secure signalling.
- 10. Physical security domain associated with network connections that consist of physical lines.
- 11. Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
- 14. Virus known to spread over GSM-SMS networks.
- 16. Method used to physically cut into a cable and steal / divert signal.
- 17. Wifi encryption method that is easy to hack
- 18. Mobile technology that uses the TDMA radio signal.
Down
- 1. Mobile technology that competes with GSM.
- 2. Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
- 4. The process of tricking people by changing your apparenet identity.
- 5. Modern wireless technology that creates homespots and hotspots.
- 6. Trade name for 4G networks
- 8. Attack vector utilized which the target of most fraudster. A ____ domain attack.
- 9. Modern wireless technology based on local Microwave Signals
- 12. The initals for the internet protocol that secures most mobile networks.
- 13. Type of server resident on a GSM network and utilized to force code onto handsets.
- 15. The identification number assigned to every GSM device.
- 17. Wifi encryption method that is difficult to hack
- 19. The item inserted into a device which holds an encryption key.