Network Security

1234567891011121314151617181920
Across
  1. 3. puts up a barrier in between internal network and outside networks
  2. 8. Determining the privileges to resources, objects, or data
  3. 11. stop people from uploading or forwarding important information in an not safe way
  4. 12. determining the privileges of a user
  5. 13. cryptographic hash functions published by NIST
  6. 14. Confidentiality, Integrity, Availability
  7. 15. encrypts the connection from an endpoint to a network
  8. 17. combines multiple layers of defenses at the edge and in the network
  9. 19. blocks incoming attacks and controls outbound messages to prevent the loss of data
  10. 20. countermeasures to avoid or fight against security risks
Down
  1. 1. collections of equal and non-equal encryption algorithms
  2. 2. determines physical location
  3. 4. protects a wireless network
  4. 5. hiding information in blocks or within images
  5. 6. control web use, block threats, and deny access to malicious websites
  6. 7. automatically sees activities that are not normal
  7. 9. commonly used hash function that makes 128-bit hash value
  8. 10. protection of information or information resources
  9. 16. the only protection for the data when the defense fails
  10. 18. Access, Authentication, Authorization