Across
- 1. Interference from radio signals that affect network performance.
- 4. A wireless attack that forces devices off a network by spoofing disconnect signals.
- 7. Marking physical locations to indicate open wireless networks.
- 8. The name that identifies a wireless network to users.
- 9. A strong encryption standard widely used to secure wireless and data communication.
- 12. An unauthorized wireless access point connected to a secure network.
- 14. A type of attack that exploits weaknesses in WEP’s initialization vectors.
- 16. A wireless security protocol designed to replace WEP.
- 17. An outdated and insecure wireless encryption protocol.
- 20. A fake wireless access point set up to mimic a legitimate one for spying.
- 22. Sending unsolicited messages over Bluetooth to nearby devices.
- 23. A shared password used to access a secured wireless network.
- 25. An initial user profile with preset credentials, often a security risk if unchanged.
Down
- 2. An enclosure that blocks electromagnetic signals from entering or leaving.
- 3. A setting that prevents wireless clients from communicating with each other.
- 5. Gaining higher access rights than originally permitted to perform unauthorized actions.
- 6. A hidden way to bypass normal authentication and gain access to a system.
- 10. Intercepting phone or network communication without permission.
- 11. A method of allowing or denying devices based on their MAC addresses.
- 13. Leaked electromagnetic signals that could be captured and exploited.
- 15. An older encryption protocol used with WPA that adds per-packet key mixing.
- 18. Interference caused by electromagnetic signals that disrupt data transmission.
- 19. Illegally accessing data from a Bluetooth-enabled device without permission.
- 21. Driving around to detect unsecured wireless networks.
- 24. A secure method for transmitting classified information through a network.
