Across
- 2. , Virus known to spread over GSM-SMS networks.
- 4. , Mobile technology that competes with GSM.
- 6. , The utilization of algorithms to secure signalling.
- 7. , The process of tricking people by changing your apparenet identity.
- 8. , Wifi encryption method that is easy to hack
- 9. , Trade name for 4G networks
- 12. , Modern wireless technology that creates homespots and hotspots.
- 14. , Wifi encryption method that is difficult to hack
- 16. , Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
- 17. , The item inserted into a device which holds an encryption key.
- 18. , Mobile technology that uses the TDMA radio signal.
Down
- 1. , Type of server resident on a GSM network and utilized to force code onto handsets.
- 3. , The process of securing a network appliance or server to protect it against hacking.
- 5. , Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
- 7. , Method used to physically cut into a cable and steal / divert signal.
- 10. , Physical security domain associated with network connections that consist of physical lines.
- 11. , Physical security domain associated with internal IT systems. (BSS)
- 13. , The identification number assigned to every GSM device.
- 14. , Modern wireless technology based on local Microwave Signals
- 15. , Attack vector utilized which the target of most fraudster. A ____ domain attack.
- 16. , The initals for the internet protocol that secures most mobile networks.