Across
- 3. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
- 6. date and time of a message.
- 12. detects unwanted attempts to manipulate network systems and/or environments
- 13. looks inside every packet on a network segment.
- 16. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
- 17. the facility to which the message refers.
- 18. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- 21. text string containing detailed information about the even being reported.
- 22. supports plaintext authentication with community strings and uses only UDP.
- 23. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- 25. protocol analyzers such as load testing, connectivity testing, and throughput testing.
- 26. a text string that uniquely describes the message.
- 27. a single digit code from 0 to 7 that indicates the severity of the message.
Down
- 1. a powerful enterprise (large corporate environment) network intrusion and prevention system.
- 2. most popular form of TCP scanning
- 4. a device that test the speed of data transfer in the network.
- 5. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
- 7. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
- 8. a software tool designed to search a host for open ports.
- 9. a device that test the speed of data transfer in the network.
- 10. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- 11. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
- 14. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- 15. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
- 19. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
- 20. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
- 24. used for sniffing wireless networks
