Across
- 1. a security solution that allows individuals or organizations to safely access sensitive data from a remote location by preventing interception by hackers.
- 5. a network component that joins different LANs together.
- 7. A hacking method that involves a program systematically trying every possible combination of characters (passwords, PINs, etc.) until it guesses the correct one.
- 8. a unique address given to a device by the manufacturer.
- 10. A general term for any malicious software designed to cause damage, gain unauthorized access, or disrupt computer operations.
- 13. a network component that connects segregated parts of a LAN.
- 15. is one that contains two types of computers, a client and a server.
- 16. a network component that uses a computer’s MAC address to send data packets to a destination within a network.
- 17. a unique address given to a device, normally by a router.
- 20. a network component that is used to boost a signal in data transmission.
- 21. Flooding a website or online service with so much traffic from multiple computers that it crashes or becomes unusable.
- 23. is a wireless WAN that uses radio to transmit and receive communications from portable devices, such as smartphones.
- 25. a relatively small network that is located within a single building or site.
Down
- 2. Contains the actual data being transferred.
- 3. a network component that joins computers together and forwards data packets to all connected devices.
- 4. the data packets sent across the network can take any available path.
- 6. Contains control flags and error checking methods (to ensure the data is correct).
- 9. two or more computers or devices connected together so they can communicate and share data and resources.
- 11. a network component that receives and transmits radio signals to allow wireless (Wi-Fi) connection to a network.
- 12. a unit of data in data transmission.
- 14. a network component that uses a computer’s IP address to send data packets to a destination outside the current network.
- 18. a computer in a network that is a point of control.
- 19. Contains metadata like the Source IP (sender's address), Destination IP (receiver's address), and a Sequence Number (to reorder packets).
- 22. A network of private computers that have been infected with malware and are controlled remotely by a single attacker.
- 24. a relatively large network that is normally two or more LANs that are linked.
