Across
- 2. The name of the Wi-Fi network that is being set up.
- 7. An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
- 9. Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
- 10. An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
- 1. Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
- 3. A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
- 4. Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
- 5. The speed at which data is transmitted and received among the devices on your wireless network.
- 6. Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
- 8. A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.
