Network Security

1234567891011121314151617181920212223
Across
  1. 3. permits or denies based on physical burnt in address
  2. 6. logical seperation of your network
  3. 8. access _________ list, allow or deny traffic on routers interfaces
  4. 9. protocol used for reading and writing directories over network
  5. 10. code runs, destroys database server after employee fired
  6. 12. group of computers luring bad guys
  7. 15. process where data formatted in a way that only the receiver can "break" the code
  8. 16. attack restricts your data until you pay
  9. 17. terminal access remote, not secure
  10. 19. okay, you signed in? what access do you have
  11. 20. inside, outside, _______ zone
  12. 21. fingerprint, iris, voice authentication
  13. 23. pretend to be someone that you are not
Down
  1. 1. traffic redirected to unintentional intermediary
  2. 2. signin once, authenticated anywhere
  3. 4. who are you?
  4. 5. social ____ , phishing is an example
  5. 7. AAA protocol, needs server
  6. 11. something you are, and something you know
  7. 13. WPA uses it to check key integrity
  8. 14. traffic redirected to intentional intermediary
  9. 18. restricts or allows features in a particular area
  10. 20. using common words as passwords to force your way in
  11. 22. force a service to fail, distributed