Across
- 4. software that monitors what you do on your computer without your knowledge.
- 5. the points where network backbones connect to each other
- 7. the different types of network communications
- 8. someone who legally breaks into a system in order to assess security deficiencies
- 9. generic term for software with a malicious purpose
- 11. used with a firewall to hide internal IP addresses and to display a single IP address to the world
- 12. command typed at a windows command line that displays IP information
- 15. process of determining whether or not given credentials are authorized for access
- 17. a large number of computers that are connected to each other
- 18. a small program that replicates and hides itself inside another program or file.
- 19. unique addresss for a network interface card.
- 20. a 32 bit number that is assigned to each host to divide the IP address into network and node portions
- 21. sends a test packet or echo pack to a device to verify it is accessible
- 22. layer of OSI model that provides end-to-end communication control. (TCP,UDP)
Down
- 1. Hardware or Software designed to prevent unauthorized access to a network
- 2. layer of OSI model that manages dialogue between end-user application processes
- 3. layer of OSI model that describes the physical properties of media
- 6. layer of OSI model that is split into two sublayers: MAC and LLC
- 7. layer of OSI model that deals with syntactical differences in data representation within the end-users systems.
- 10. connects two or more networks together.
- 12. a series of four values separated by periods that designate a device's location on a network
- 13. the appropriate word for intruding into a system without permission.
- 14. an attacker blocks access to a network from legitimate users.
- 15. layer of OSI model where POP, SMTP, and FTP protocols are used
- 16. The three pillars of security: confidentiality, integrity, and availability
- 23. layer of OSI model that routes the information in a network (IP, ARP)
