Cybersecurity Fundamental Chapter 7 Part 2

12345678910111213
Across
  1. 9. dedicated site that monitor, assesses, and defends the organization's information system.
  2. 10. can supplement or in some cases, replace security guards.
  3. 12. hardware or software solutions that enforce network security policies. Filters unauthorize or potentially dangerous traffic from entering the network.
  4. 13. uses network to make or receive phone calls.
Down
  1. 1. one of the faster sectors of information technology is the use of intelligent devices and sensors.
  2. 2. allows two or more locations to communicate simultaneously using telecommunication technologies.
  3. 3. logs the transaction for later retrieval.
  4. 4. one or more location containing the tools that provide administrators with a detail status of the organization's network.
  5. 5. form the backbone of the internet and communications between different
  6. 6. the outermost layer of security, and these solutions are the most publicly visible.
  7. 7. can be the foundation of highly secure identification and personal verification solutions.
  8. 8. allows an individual to gain access to an area with automated entry points.
  9. 11. provide a way to group devices within a LAN and on individual switches. use logical connections instead of physical connections.