Across
- 4. Contains servers that should be acdcessibile from the Internet.
- 7. A network appliance dedicated to the purpose of acting like a firewall.
- 9. Rules typically applied to router interfaces, which specify permitted and denied traffic.
- 12. A network containing more than one honey pot.
- 15. Can support secure communications between two sites over an untrusted network.
- 18. A system designed to be very appealing to hackers, when in fact it is a trap to catch them.
- 19. An Intrusion _______ System resides in-line with traffic flow and can recognize the signature of a well-known attack and respond.
- 20. A TCP-based protocol that encrypts an entire authentication packet.
Down
- 1. An Intrusion _______ System does not reside in-line traffic flow and thus one or more malicious packets might reach an intended victim before traffic flow is stopped.
- 2. A type of firewall that not only examines packets but also knows the context within which the packet was sent.
- 3. A client-server authentication protocol that supports mutual authentication between client and server.
- 5. A UDP-based protocol that does not ecrypt the entire authentication packet, but only the password.
- 6. A device or software that provides a barrier between your machine or network and the rest of the world.
- 8. An attack that is launched from multimple locations that denies service.
- 10. A computer running firewall software.
- 11. Encryption method where both the sender and receiver of a packet use a shared key for encryption and decryption.
- 13. An attack that uses the FTP PORT command to covertly open a connetion with a remote system.
- 14. A type of firewall that inspects traffic leaving the inside network as it goes out to the Internet.
- 16. Internet Protocol Security, a method to secure VPN's
- 17. Encryption method where the sender and receiver of a packet use different keys.
