Across
- 3. varies in size and can sustain network operations for only a limited time in the event of an outage
- 7. attacker poses as a trusted site
- 9. analyzes data, identifies attacks, responds to intrusions
- 10. after user is authenticated, he is granted access to resources or services n the network
- 13. pretends to do one thing while doing something malicious
- 16. a form of network equipment redundancy
- 17. a rogue access point that looks like a legit access point
- 19. manipulating people inside the network environment to gain access to the network from the outside
- 22. uses your info to generate targeted ads
- 23. used to check for weakness in a network
- 24. consists of software safeguards
- 25. programming a list of mac addresses that you accept and block all others
Down
- 1. a program that has two jobs: to replicate and activate
- 2. when a person goes through trash to find personal info
- 4. a user identifies himself to the system and the identity is verified against authentication database
- 5. duplication of digital components/devices
- 6. hides itself from all but the most aggressive antimalware tools
- 8. replicates exclusively through networks
- 11. something on a system or network that you don't want to have to happen
- 12. method used to prevent passage of any TCP or UDP segments or datagrams through any port other than ones assigned by system admin
- 14. consists of hardware safeguards
- 15. flooding the network w/so many requests that it stops functioning
- 18. using another person's wireless network w/o permission
- 20. software that helps prevent intrusions
- 21. the tracking of a network and resource usage on the network
