Across
- 6. Holds users responsible for their actions in a networked environment
- 7. The process of claiming an identity before authentication
- 10. Forwards data packets between different networks efficiently
- 11. Data is broken into smaller units and transmitted independently across the network
- 13. Connects devices in a LAN and forwards data based on MAC addresses
- 14. Restricts or permits traffic based on predefined security policies
- 15. A cyberattack that involves unauthorized monitoring without altering data
- 17. Verifies the identity of a user or system before granting access
Down
- 1. A layered security approach using multiple protective measures
- 2. Guarantees that data remains consistent, accurate, and unaltered during transmission or storage
- 3. Ensures systems and services are accessible when needed
- 4. Ensures that sensitive data is not disclosed to unauthorized individuals or systems
- 5. Prevents denial of actions or communications by users
- 8. An attack launched straight from the attacker to the target system
- 9. Automatically assigns IP addresses and configurations to network devices
- 11. Tricks users into revealing confidential information by impersonating trusted sources
- 12. A fully isolated and organization-controlled network
- 16. Translates private IP addresses into public IP addresses for external communication
- 17. Resolves IP addresses to MAC addresses for local communication
- 18. Detects and blocks malicious traffic patterns within the network
