Across
- 3. Architecture based access control
- 8. Malware that gives the attacker full control
- 10. Result of a successful attack
- 11. Network layer encryption technology
- 12. Adaptable Cisco product that is both a firewall and IPS
- 13. A blocking or filtering device based on ACLs
- 14. The Ironport model for Email Security
- 17. A set of rules defined by a business
- 18. Malicious software that infects after a user clicks on the attachment
Down
- 1. Malware installed on a computer that attacks on command
- 2. Malware that the user thinks they want
- 4. Application layer encryption technology
- 5. A Cisco pioneered, standards based, VPN that ensures consistent application of policy
- 6. Cisco product for web or email security
- 7. Malicious software that is self propagating evilness
- 9. Standard based link layer encryption
- 15. The router that only offers an IOS Firewall
- 16. The Ironport model for Web Security
