module 1

123456789101112131415161718
Across
  1. 6. Holds users responsible for their actions in a networked environment
  2. 7. The process of claiming an identity before authentication
  3. 10. Forwards data packets between different networks efficiently
  4. 11. Data is broken into smaller units and transmitted independently across the network
  5. 13. Connects devices in a LAN and forwards data based on MAC addresses
  6. 14. Restricts or permits traffic based on predefined security policies
  7. 15. A cyberattack that involves unauthorized monitoring without altering data
  8. 17. Verifies the identity of a user or system before granting access
Down
  1. 1. A layered security approach using multiple protective measures
  2. 2. Guarantees that data remains consistent, accurate, and unaltered during transmission or storage
  3. 3. Ensures systems and services are accessible when needed
  4. 4. Ensures that sensitive data is not disclosed to unauthorized individuals or systems
  5. 5. Prevents denial of actions or communications by users
  6. 8. An attack launched straight from the attacker to the target system
  7. 9. Automatically assigns IP addresses and configurations to network devices
  8. 11. Tricks users into revealing confidential information by impersonating trusted sources
  9. 12. A fully isolated and organization-controlled network
  10. 16. Translates private IP addresses into public IP addresses for external communication
  11. 17. Resolves IP addresses to MAC addresses for local communication
  12. 18. Detects and blocks malicious traffic patterns within the network