Across
- 2. (No spaces) Overwhelms a network, server, or website with excessive traffic, making it unavailable to users.
- 4. The C in FCAPS
- 6. A future event that could negatively impact the project processes or outcome
- 9. The A in MFA
- 10. A type of malware, encrypts files until a payment is made.
- 14. The name of Unit 1, no spaces.
- 16. How attackers deceive individuals into revealing sensitive information, usually by email
- 20. The act of compromising digital devices and networks through unauthorised access to an account or computer system.
- 23. Highly secure as they rely on unique biological traits that are difficult to forge.
- 24. the P in FCAPS
- 25. Using a legitimate/authorised user's credentials to gain unauthorised access.
Down
- 1. The M in MAN
- 3. What the "mal" is short for in malware
- 5. Sets of rules and formats that define how data is exchanged between devices on a network.
- 7. These capture, track and analyse packets sent over a Network.
- 8. A strict step by step approach to project management, originates from construction.
- 11. A network over a larger area, typically when multiple LANs are connected together.
- 12. Server, Switch, hub and router are all examples of this type of device
- 13. A hybrid of Bus and Star networks
- 15. Ensure compatibility and interoperability among different devices, vendors, and applications.
- 17. The I in CIA Triad
- 18. Used to describe attacks motivated by ideological or political reasons.
- 19. Protects sensitive data by converting it into unreadable code
- 21. Act as a barrier between trusted internal networks and untrusted external sources, blocking malicious traffic.
- 22. (No spaces) The act of searching for Wi-Fi networks from a moving vehicle.
- 24. Stage 3 of the project management lifecycle
