Network Security

12345678910
Across
  1. 3. Exposes confidential, sensitive, or protected information to an unauthorized person.
  2. 5. The process of reviewing, analyzing and managing network traffic for any abnormality or process that can affect the network.
  3. 7. Addresses that are associated with specific devices and assigned to them by the manufacturer.
  4. 9. The process of converting human-readable plaintext to incomprehensible text, also known as ciphertext.
  5. 10. A network security technology commonly used on Wi-Fi wireless networks that is part of a technology which was designed as a replacement for the older and less secure WEP.
Down
  1. 1. The process or action of proving or showing something to be true, genuine, or valid:
  2. 2. Is the overall accuracy, completeness, and consistency of data.
  3. 4. A security mechanism that identifies people by verifying their physical or behavioral characteristics.
  4. 6. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  5. 8. The protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious data loss or damage.