Network Security

12345678910111213141516171819202122232425
Across
  1. 3. varies in size and can sustain network operations for only a limited time in the event of an outage
  2. 7. attacker poses as a trusted site
  3. 9. analyzes data, identifies attacks, responds to intrusions
  4. 10. after user is authenticated, he is granted access to resources or services n the network
  5. 13. pretends to do one thing while doing something malicious
  6. 16. a form of network equipment redundancy
  7. 17. a rogue access point that looks like a legit access point
  8. 19. manipulating people inside the network environment to gain access to the network from the outside
  9. 22. uses your info to generate targeted ads
  10. 23. used to check for weakness in a network
  11. 24. consists of software safeguards
  12. 25. programming a list of mac addresses that you accept and block all others
Down
  1. 1. a program that has two jobs: to replicate and activate
  2. 2. when a person goes through trash to find personal info
  3. 4. a user identifies himself to the system and the identity is verified against authentication database
  4. 5. duplication of digital components/devices
  5. 6. hides itself from all but the most aggressive antimalware tools
  6. 8. replicates exclusively through networks
  7. 11. something on a system or network that you don't want to have to happen
  8. 12. method used to prevent passage of any TCP or UDP segments or datagrams through any port other than ones assigned by system admin
  9. 14. consists of hardware safeguards
  10. 15. flooding the network w/so many requests that it stops functioning
  11. 18. using another person's wireless network w/o permission
  12. 20. software that helps prevent intrusions
  13. 21. the tracking of a network and resource usage on the network