PHN001

12345678910111213141516171819
Across
  1. 3. The process of securing a network appliance or server to protect it against hacking.
  2. 6. Physical security domain associated with internal IT systems. (BSS)
  3. 7. The utilization of algorithms to secure signalling.
  4. 10. Physical security domain associated with network connections that consist of physical lines.
  5. 11. Physical security domain associated with voice/data devices that can be used anywhere. (CDMA, GSM ie)
  6. 14. Virus known to spread over GSM-SMS networks.
  7. 16. Method used to physically cut into a cable and steal / divert signal.
  8. 17. Wifi encryption method that is easy to hack
  9. 18. Mobile technology that uses the TDMA radio signal.
Down
  1. 1. Mobile technology that competes with GSM.
  2. 2. Method of WPA encryption that is utilized to secure corporate network devices. WPA-_______.
  3. 4. The process of tricking people by changing your apparenet identity.
  4. 5. Modern wireless technology that creates homespots and hotspots.
  5. 6. Trade name for 4G networks
  6. 8. Attack vector utilized which the target of most fraudster. A ____ domain attack.
  7. 9. Modern wireless technology based on local Microwave Signals
  8. 12. The initals for the internet protocol that secures most mobile networks.
  9. 13. Type of server resident on a GSM network and utilized to force code onto handsets.
  10. 15. The identification number assigned to every GSM device.
  11. 17. Wifi encryption method that is difficult to hack
  12. 19. The item inserted into a device which holds an encryption key.