Unit 3: Securing a LAN
Across
- 1. Switch feature that limits MAC addresses per port.
- 3. Type of control that mitigates damage after an incident.
- 4. Principle of limiting access to only what's necessary.
- 7. Technique where a device impersonates another by changing its MAC address.
- 9. Type of firewall that tracks active connections.
- 12. CIA Triad principle that restricts data access to authorized users.
- 13. A MAC address is also known as a ____ address
- 14. Type control that identify when a security breach has occurred.
Down
- 2. Type of firewall that only follows static rules
- 5. CIA Triad principle that ensures data is accurate and unaltered.
- 6. Security controls involving hardware/software like firewalls.
- 8. A device or software that filters network traffic based on rules.
- 10. Logical segmentation of a network to improve security and performance.
- 11. CIA Triad principle ensuring data is accessible when needed.