NET241 Seminar 1

1234567891011121314151617181920212223
Across
  1. 4. software that monitors what you do on your computer without your knowledge.
  2. 5. the points where network backbones connect to each other
  3. 7. the different types of network communications
  4. 8. someone who legally breaks into a system in order to assess security deficiencies
  5. 9. generic term for software with a malicious purpose
  6. 11. used with a firewall to hide internal IP addresses and to display a single IP address to the world
  7. 12. command typed at a windows command line that displays IP information
  8. 15. process of determining whether or not given credentials are authorized for access
  9. 17. a large number of computers that are connected to each other
  10. 18. a small program that replicates and hides itself inside another program or file.
  11. 19. unique addresss for a network interface card.
  12. 20. a 32 bit number that is assigned to each host to divide the IP address into network and node portions
  13. 21. sends a test packet or echo pack to a device to verify it is accessible
  14. 22. layer of OSI model that provides end-to-end communication control. (TCP,UDP)
Down
  1. 1. Hardware or Software designed to prevent unauthorized access to a network
  2. 2. layer of OSI model that manages dialogue between end-user application processes
  3. 3. layer of OSI model that describes the physical properties of media
  4. 6. layer of OSI model that is split into two sublayers: MAC and LLC
  5. 7. layer of OSI model that deals with syntactical differences in data representation within the end-users systems.
  6. 10. connects two or more networks together.
  7. 12. a series of four values separated by periods that designate a device's location on a network
  8. 13. the appropriate word for intruding into a system without permission.
  9. 14. an attacker blocks access to a network from legitimate users.
  10. 15. layer of OSI model where POP, SMTP, and FTP protocols are used
  11. 16. The three pillars of security: confidentiality, integrity, and availability
  12. 23. layer of OSI model that routes the information in a network (IP, ARP)