Across
- 3. permits or denies based on physical burnt in address
- 6. logical seperation of your network
- 8. access _________ list, allow or deny traffic on routers interfaces
- 9. protocol used for reading and writing directories over network
- 10. code runs, destroys database server after employee fired
- 12. group of computers luring bad guys
- 15. process where data formatted in a way that only the receiver can "break" the code
- 16. attack restricts your data until you pay
- 17. terminal access remote, not secure
- 19. okay, you signed in? what access do you have
- 20. inside, outside, _______ zone
- 21. fingerprint, iris, voice authentication
- 23. pretend to be someone that you are not
Down
- 1. traffic redirected to unintentional intermediary
- 2. signin once, authenticated anywhere
- 4. who are you?
- 5. social ____ , phishing is an example
- 7. AAA protocol, needs server
- 11. something you are, and something you know
- 13. WPA uses it to check key integrity
- 14. traffic redirected to intentional intermediary
- 18. restricts or allows features in a particular area
- 20. using common words as passwords to force your way in
- 22. force a service to fail, distributed
