Across
- 3. Ensures the existence of multiple pathways of communication
- 4. A form of networking where each computer is a peer
- 6. Refers to the newness of an exploit which may be known in the hacker community for days or weeks
- 7. Filtering concept where the network denies all activities except for those specified here
- 9. When in use, the client workstation converts to thin client status
- 12. A utility or device that captures network communications for investigation and analysis
- 13. A weakness or flaw in a host, node, or any other infrastructure that a hacker can exploit
- 14. Any potential harm to a resource or node on a network
- 15. The act of transmitting a protocol across an intermediary network by encapsulating it in another protocol
- 16. Acts as a middle man between client and server. Can hide the identity of the client, filter content, perform NAT, and cache content.
- 18. The confidence that other users will act in accordance with the organization’s security rules.
Down
- 1. Virtual Private Network
- 2. Network security service that allows a user to authenticate to an entire domain through a single client log on process
- 3. Communication link that enables access to network resources using a WAN link to connect to a distant network
- 5. Small home, home office network
- 8. The process of purging a storage device by writing zeroes to all addressable locations on the device
- 10. Written document prescribing security goals, mission, objectives, standards, procedures, and implementations for a given organization
- 11. A computer system that hosts resources accessed by users from clients
- 17. Network device responsible for directing traffic towards its stated destination
- 19. The likelihood or potential for a threat to take advantage of a vulnerability
