IDK

1234567891011
Across
  1. 4. A potential for violation of security
  2. 5. A collection of host computers together that can communicate with each other
  3. 9. A term to describe connecting multiple separate networks together.
  4. 11. identity usurpation to get access to some personal data
Down
  1. 1. any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
  2. 2. A cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.
  3. 3. Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990.
  4. 6. A network point that acts as an entrance to another network.
  5. 7. something that's protecting you frome virus
  6. 8. a tool that monitors network traffic as it received in a network interface.
  7. 10. a service who allow you to access to some foreign content