Across
- 3. Program secretly collecting information.
- 8. :Deny or allow packet based on rules.
- 9. :A program to stop virus attack.
- 10. :Business and Personal equipment must be protected
- 13. :All devices can talk to each other.
- 17. :Marks IP address in network diagram
- 19. :An attack named after greek-trojan war.
- 20. :Network Can grow
- 22. :Access to people inside company only.
- 23. :A powerful machine which answers.
- 25. :interconnects networks
Down
- 1. : An attack which slows down or crashes equipment and programs
- 2. :Network attack that occurs on the first day that a vulnerability becomes known.
- 4. :A machine which asks or start communication.
- 5. :A Method to connect Business to Internet
- 6. :Address space for IoT
- 7. :Blocks Unauthorised access to networks.
- 11. :WANs are in control of _______________.
- 12. :A known person trying to access you system.
- 14. :__________Signals are used to carry message in fibre optic cables
- 15. :Creates a secure connection for remote workers.
- 16. :command to go from switch> to switch#
- 18. :Stealing your username and password.
- 21. :interconnect end devices in a limited area such as a home, school, office building, or campus.
- 22. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- 24. :Priority Queues
