Module 1 Puzzle

12345678910111213141516171819
Across
  1. 3. A small file containing information from a Web site
  2. 4. A binary piece of data prepared for transmission over a network
  3. 5. A check of systems security. This usually includes a review of documents, procedures, and system configurations
  4. 6. A device that separates/connects networks
  5. 7. Hackers who normally behave legally, but who may, for certain reasons and in limited situations, conduct illegal activities, usually for reasons they feel are ethically compelling
  6. 9. Any software that has a malicious purpose, such as a virus or trojan horse
  7. 13. A subsection of a network
  8. 14. A protocol that is part of the TCP/IP suite of protocols, which is
  9. 17. A hacker term for a person who claims much greater hacking skill than he actually has
  10. 18. A seven-layer model describing network connnectivity, devices,and protocols
  11. 19. An Internet address, such as www.facebook.com
Down
  1. 1. Hackers who hack only for legal/ethical purposes
  2. 2. A device or software that provides a barrier between your machine or network and the rest of the world
  3. 3. Confidentiality, Integrity, and Availability
  4. 5. The process to verify that a user is authorized to access a given resource. This is part of the logon system
  5. 8. A utility that provides extensive information about a computer’s network connection
  6. 10. A protocol used to send data over the Internet; part of the TCP/IP suite of protocols
  7. 11. A machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
  8. 12. The central Internet connection to which Internet Service Providers must ultimately connect
  9. 15. foundation for most networking and all Internet
  10. 16. A protocol critical for securing virtual private networks