CW1

12345678910111213141516171819202122232425
Across
  1. 2. :A program to stop virus attack.
  2. 5. :Deny or allow packet based on rules.
  3. 6. :Blocks Unauthorised access to networks.
  4. 11. :A powerful machine which answers.
  5. 12. : An attack which slows down or crashes equipment and programs
  6. 13. :interconnects networks
  7. 14. :Stealing your username and password.
  8. 17. :Marks IP address in network diagram
  9. 18. :A machine which asks or start communication.
  10. 20. :All devices can talk to each other.
  11. 23. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
  12. 25. Program secretly collecting information.
Down
  1. 1. :An attack named after greek-trojan war.
  2. 3. :Access to people inside company only.
  3. 4. :Network Can grow
  4. 7. :Network attack that occurs on the first day that a vulnerability becomes known.
  5. 8. :Business and Personal equipment must be protected
  6. 9. :WANs are in control of _______________.
  7. 10. :A known person trying to access you system.
  8. 15. :__________Signals are used to carry message in fibre optic cables
  9. 16. :A Method to connect Business to Internet
  10. 17. :interconnect end devices in a limited area such as a home, school, office building, or campus.
  11. 19. :Address space for IoT
  12. 21. :Priority Queues
  13. 22. :command to go from switch> to switch#
  14. 24. :Creates a secure connection for remote workers.