Cisco Chapter 11

12345678910
Across
  1. 2. malicious code that presents itself as something it is not
  2. 5. network attack involves the disabling or corruption of networks, systems, or services
  3. 6. allows traffic that originated from inside the local network to return through the firewall from outside the network
  4. 9. someone who steals your personal information
  5. 10. network attack that replicated and attacks other computers
Down
  1. 1. communication between you and your friend but someone else is monitoring you
  2. 3. after looking at your data, they change the data
  3. 4. the duplication of critical components or functions of a system with the intention of increasing reliability of the system
  4. 7. someone trying to gain control of your system by trying to crack the password
  5. 8. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data