Network Security

1234567891011121314151617181920
Across
  1. 7. determining the privileges of a user
  2. 10. protection of information or information resources
  3. 11. commonly used hash function that makes 128-bit hash value
  4. 12. Access, Authentication, Authorization
  5. 13. puts up a barrier in between internal network and outside networks
  6. 16. collections of equal and non-equal encryption algorithms
  7. 18. combines multiple layers of defenses at the edge and in the network
  8. 20. determines physical location
Down
  1. 1. stop people from uploading or forwarding important information in an not safe way
  2. 2. automatically sees activities that are not normal
  3. 3. cryptographic hash functions published by NIST
  4. 4. control web use, block threats, and deny access to malicious websites
  5. 5. the only protection for the data when the defense fails
  6. 6. Confidentiality, Integrity, Availability
  7. 8. protects a wireless network
  8. 9. blocks incoming attacks and controls outbound messages to prevent the loss of data
  9. 14. hiding information in blocks or within images
  10. 15. Determining the privileges to resources, objects, or data
  11. 17. countermeasures to avoid or fight against security risks
  12. 19. encrypts the connection from an endpoint to a network