Network Security Crossword

12345678910111213141516171819202122232425262728293031323334
Across
  1. 5. A network comprised of clients all connected to the same server.
  2. 6. What IAM stands for
  3. 12. A program that disguises itself as something else to let malicious users access your system.
  4. 14. What ZTNA stands for
  5. 15. Also known as the "group chat" network type
  6. 19. "Intrusion Prevention Systems"
  7. 20. Applications / workloads that are hosted on a cloud / not locally
  8. 22. Prevents exposure of sensitive information outside of an organization.
  9. 23. The thing that sends the signal to the clients to connect to the server.
  10. 26. Keeps out unfriendly network traffic, and controls incoming and outgoing traffic.
  11. 31. What WAN stands for
  12. 33. What DoS stands for
  13. 34. Processes, products, and services designed to protect email accounts.
Down
  1. 1. A network comprised of local machines all connected to each other
  2. 2. A user / device on a network
  3. 3. What "A" stands for in WAN
  4. 4. What RBAC stands for
  5. 7. Virus that gather info about a person or organization without them knowing
  6. 8. A way a network is setup, such that if one client sends a message, then NOT EVERYONE gets it
  7. 9. "Eats" bandwidth, slows networks. Is a standalone malware.
  8. 10. What the "W" stands for in WLAN
  9. 11. What VPN stands for
  10. 13. Defines the people or groups & devices that have access to network applications and systems.
  11. 16. Customized ads show up because of data they collected on you.
  12. 17. What FWaaS stands for
  13. 18. Ability of an architecture to scale appropriately as more things are added to the system or network.
  14. 21. "Wireless local area network"
  15. 24. Malware that is designed to hold someone / an organization's data on "ransom"
  16. 25. Running code / opening files in a safe, isolated environment.
  17. 27. Any program that is intentionally designed with malicious intent
  18. 28. A downloadable malicious file that replicates itself, much like the real life version of this does.
  19. 29. "Personally Identifiable Information"
  20. 30. Defines boundaries between parts of a network where clients have common aspects.
  21. 32. Digital space where data is stored non-locally