Chapter 9 - Securing Network Media and Devices

12345678910111213141516171819202122232425
Across
  1. 1. Interference from radio signals that affect network performance.
  2. 4. A wireless attack that forces devices off a network by spoofing disconnect signals.
  3. 7. Marking physical locations to indicate open wireless networks.
  4. 8. The name that identifies a wireless network to users.
  5. 9. A strong encryption standard widely used to secure wireless and data communication.
  6. 12. An unauthorized wireless access point connected to a secure network.
  7. 14. A type of attack that exploits weaknesses in WEP’s initialization vectors.
  8. 16. A wireless security protocol designed to replace WEP.
  9. 17. An outdated and insecure wireless encryption protocol.
  10. 20. A fake wireless access point set up to mimic a legitimate one for spying.
  11. 22. Sending unsolicited messages over Bluetooth to nearby devices.
  12. 23. A shared password used to access a secured wireless network.
  13. 25. An initial user profile with preset credentials, often a security risk if unchanged.
Down
  1. 2. An enclosure that blocks electromagnetic signals from entering or leaving.
  2. 3. A setting that prevents wireless clients from communicating with each other.
  3. 5. Gaining higher access rights than originally permitted to perform unauthorized actions.
  4. 6. A hidden way to bypass normal authentication and gain access to a system.
  5. 10. Intercepting phone or network communication without permission.
  6. 11. A method of allowing or denying devices based on their MAC addresses.
  7. 13. Leaked electromagnetic signals that could be captured and exploited.
  8. 15. An older encryption protocol used with WPA that adds per-packet key mixing.
  9. 18. Interference caused by electromagnetic signals that disrupt data transmission.
  10. 19. Illegally accessing data from a Bluetooth-enabled device without permission.
  11. 21. Driving around to detect unsecured wireless networks.
  12. 24. A secure method for transmitting classified information through a network.