Network Security

123456789101112131415161718
Across
  1. 2. - using another person's wireless network without permission.
  2. 9. Provides incremental trunk speeds by combining multiple Fast Ethernet links.
  3. 10. Can sustain network operations for only a limited time in the event of an outage.
  4. 13. a program that has two jobs: to replicate and to activate.
  5. 14. (AUP) states what users are allowed and not allowed to do on the company’s network
  6. 15. any program or code designed to do something on a system or network that you don’t want to have happen.
  7. 17. a function of any program that sends information about your system or your actions over the Internet.
  8. 18. A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
Down
  1. 1. (IPS)- similar to IDS, but adds the capability to react to an attack (Active)
  2. 3. the 2nd most common firewall tool ensuring port security through port filtering
  3. 4. Horse- is a piece of malware that looks or pretends to do one thing while, at the same time, doing something bad.
  4. 5. diving- when a person goes through the trash in order to find personal information
  5. 6. uses duplication of critical components/devices, increasing the reliability of the system.
  6. 7. Redundant ___ eliminates a single point of power failure.
  7. 8. protect entire buildings for sustained periods to ensure mission-critical devices remain functional.
  8. 11. functions similar to a virus. It replicates exclusively through networks.
  9. 12. Engineering is the process of using or manipulating people inside the network environment to gain access to that network from the outside
  10. 16. occurs when a user identifies himself to the system, and the identity is verified against an authentication database