Across
- 7. – Fraudulent attempt to steal.
- 10. (Domain Name System) – Translates domains into IP.
- 12. – Wired network connection standard.
- 15. Authentication (2FA) – Extra security verification step.
- 16. – Small unit of data.
- 17. (Service Set Identifier) – Wi-Fi network name.
- 19. – Converts data into code.
- 21. Server – Acts as intermediary gateway.
- 23. – Malicious software program.
- 24. (Dynamic Host Configuration Protocol) – Assigns IP automatically.
- 25. (Distributed Denial of Service) – Overloads network with requests.
Down
- 1. – Checks network connectivity.
- 2. – Secures data using cryptography.
- 3. (Virtual Private Network) – Secure network over internet.
- 4. – Filters unauthorized network traffic.
- 5. – Connects different network segments.
- 6. Detection System (IDS) – Monitors suspicious network activity.
- 8. Mask – Defines IP address range.
- 9. – Directs data to devices.
- 11. Trust – Never trust, always verify.
- 13. – Internet's fundamental communication protocol.
- 14. Address – Unique hardware device identifier.
- 18. – Delay in data transmission.
- 20. Address – Identifies devices on network.
- 22. – Maximum data transfer rate.
