CW1

12345678910111213141516171819202122232425
Across
  1. 3. Program secretly collecting information.
  2. 8. :Deny or allow packet based on rules.
  3. 9. :A program to stop virus attack.
  4. 10. :Business and Personal equipment must be protected
  5. 13. :All devices can talk to each other.
  6. 17. :Marks IP address in network diagram
  7. 19. :An attack named after greek-trojan war.
  8. 20. :Network Can grow
  9. 22. :Access to people inside company only.
  10. 23. :A powerful machine which answers.
  11. 25. :interconnects networks
Down
  1. 1. : An attack which slows down or crashes equipment and programs
  2. 2. :Network attack that occurs on the first day that a vulnerability becomes known.
  3. 4. :A machine which asks or start communication.
  4. 5. :A Method to connect Business to Internet
  5. 6. :Address space for IoT
  6. 7. :Blocks Unauthorised access to networks.
  7. 11. :WANs are in control of _______________.
  8. 12. :A known person trying to access you system.
  9. 14. :__________Signals are used to carry message in fibre optic cables
  10. 15. :Creates a secure connection for remote workers.
  11. 16. :command to go from switch> to switch#
  12. 18. :Stealing your username and password.
  13. 21. :interconnect end devices in a limited area such as a home, school, office building, or campus.
  14. 22. : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
  15. 24. :Priority Queues