Review - from Wk4 to Wk6

1234567891011121314151617
Across
  1. 2. the primary use is to interconnect various network segments, they usually provide basic traffic filtering capabilities.
  2. 6. (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
  3. 7. can block or deny traffic based on a positive rule or signature match.
  4. 8. You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
  5. 10. (9,3,9) (aka quid pro quo) This is when an attacker requests personal information from someone in exchange for something, like a gift.
  6. 11. (3-2-3-6) attack happens when a cybercriminal takes control of a device without the user’s knowledge. With this level of access, an attacker can intercept and capture user information before it sends it to its intended destination.
  7. 12. These systems use signatures or behavioural analysis of applications to identify and block malicious code from being executed.
  8. 13. (7,5) a firewall that operate at the OSI layer 3, it filters communications based on source and destination IP addresses.
  9. 15. (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
  10. 16. (7,7,11) a firewall that hides or masquerades the private addresses of network hosts, NAT.
  11. 17. (3,6,14) adds an extra layer of security for account logins. Besides your username and password or personal identification number (PIN), requires a second token to verify your identity.
Down
  1. 1. (4,8) application running on a device identifying open port numbers on a host.
  2. 3. will log the detection and create an alert for a network administrator. It will not take action.
  3. 4. can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
  4. 5. is the process of converting information into a form in which unauthorized parties cannot read it.
  5. 8. (7,7,7) let's remote employees use a secure encrypted tunnel from their mobile computer and securely connect to the organization’s network. This systems can also securely interconnect branch offices with the central office network.
  6. 9. (6,11)is manipulating people into performing actions or divulging confidential information.
  7. 14. may prevent the loss of irreplaceable data.