Across
- 4. A potential for violation of security
- 5. A collection of host computers together that can communicate with each other
- 9. A term to describe connecting multiple separate networks together.
- 11. identity usurpation to get access to some personal data
Down
- 1. any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- 2. A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
- 3. Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990.
- 6. A network point that acts as an entrance to another network.
- 7. something that's protecting you frome virus
- 8. a tool that monitors network traffic as it received in a network interface.
- 10. a service who allow you to access to some foreign content
