Across
- 3. The practice of sending users to a fraudulent website to gain control over or gain information from a user.
- 7. ISPs that use paid transit for more local transit.
- 9. Targeting powerful figures such as CEOs and Celebrities to gain the most valuable information.
- 12. A security tool that uses multiple one-time passwords to create a much more secure login.
- 15. Use of manipulative techniques to gain information from a target such as passwords.
- 16. An IP network that can reach every other network on the internet without paying for a transit.
- 18. A secure, centralized building that houses computer infrastructure, such as servers and data storage drives.
- 19. The set of rules governing how data is transmitted and addressed on the internet,
- 20. The largest network in the world, connecting almost every network and device to each
Down
- 1. An internet security tool that masks your IP address and sends it through an encrypted tunnel
- 2. The practice of sending fraudulent messages in order to trick victims into revealing information.
- 4. The vast majority of the internet, it can only be accessed through authorized access such as a password or a paywall.
- 5. Any unauthorized activity that compromises the confidentiality, integrity, and availability of data systems.
- 6. The part of the internet that can be freely accessed by everyone.
- 8. A network security tool that acts as a digital barrier between a trusted network and an untrustworthy network.
- 10. The part of the internet that is intentionally hidden and requires special software to access it.
- 11. Process of gathering information on a target without directly interacting with its systems.
- 13. A security tool that detects, prevents, and removes malicious software.
- 14. The final segment of a network that relies on infrastructure that physically connects an ISP’s network to an end user.
- 17. A powerful computer that stores data and manages network resources for a network, delivering it to other “client” computers.
