May 2021 Newsletter Crossword Puzzle

12345678910
Across
  1. 2. The name of the Wi-Fi network that is being set up.
  2. 7. An individual, groups, or states who maliciously intend to take advantage of vulnerabilities to gain unauthorized access to information systems in order to access networks, systems, devices, and data.
  3. 9. Security professionals who act as adversary hackers to successful attack system security, gain unauthorized access to assets, and evaluate system security.
  4. 10. An attacker inserts themselves secretly between you and another person on the internet to eavesdrop and capture sensitive information like passwords.
Down
  1. 1. Network hardware that allows communication between your local home network such as personal computers and other connected devices like Alexa, an Internet of Things device.
  2. 3. A weakness that can be exploited by cybercriminals to gain unauthorized access to a network, system, device, and data.
  3. 4. Defensive security professionals responsible for maintaining internal network defenses against each threat and cyberattack.
  4. 5. The speed at which data is transmitted and received among the devices on your wireless network.
  5. 6. Wired computer networking technologies used in local area networks to connect computers and other network devices to share files, information, and data.
  6. 8. A wireless networking technology that allows devices such as computers, mobile devices, and other equipment to interface with the internet.