ASE Security

123456789101112131415161718
Across
  1. 3. Architecture based access control
  2. 8. Malware that gives the attacker full control
  3. 10. Result of a successful attack
  4. 11. Network layer encryption technology
  5. 12. Adaptable Cisco product that is both a firewall and IPS
  6. 13. A blocking or filtering device based on ACLs
  7. 14. The Ironport model for Email Security
  8. 17. A set of rules defined by a business
  9. 18. Malicious software that infects after a user clicks on the attachment
Down
  1. 1. Malware installed on a computer that attacks on command
  2. 2. Malware that the user thinks they want
  3. 4. Application layer encryption technology
  4. 5. A Cisco pioneered, standards based, VPN that ensures consistent application of policy
  5. 6. Cisco product for web or email security
  6. 7. Malicious software that is self propagating evilness
  7. 9. Standard based link layer encryption
  8. 15. The router that only offers an IOS Firewall
  9. 16. The Ironport model for Web Security