IT Networking / Cyber Security term

12345678910111213141516171819202122232425
Across
  1. 7. – Fraudulent attempt to steal.
  2. 10. (Domain Name System) – Translates domains into IP.
  3. 12. – Wired network connection standard.
  4. 15. Authentication (2FA) – Extra security verification step.
  5. 16. – Small unit of data.
  6. 17. (Service Set Identifier) – Wi-Fi network name.
  7. 19. – Converts data into code.
  8. 21. Server – Acts as intermediary gateway.
  9. 23. – Malicious software program.
  10. 24. (Dynamic Host Configuration Protocol) – Assigns IP automatically.
  11. 25. (Distributed Denial of Service) – Overloads network with requests.
Down
  1. 1. – Checks network connectivity.
  2. 2. – Secures data using cryptography.
  3. 3. (Virtual Private Network) – Secure network over internet.
  4. 4. – Filters unauthorized network traffic.
  5. 5. – Connects different network segments.
  6. 6. Detection System (IDS) – Monitors suspicious network activity.
  7. 8. Mask – Defines IP address range.
  8. 9. – Directs data to devices.
  9. 11. Trust – Never trust, always verify.
  10. 13. – Internet's fundamental communication protocol.
  11. 14. Address – Unique hardware device identifier.
  12. 18. – Delay in data transmission.
  13. 20. Address – Identifies devices on network.
  14. 22. – Maximum data transfer rate.