Security

1234567891011
Across
  1. 1. - The practice of secure communication in the presence of third parties.
  2. 2. - A type of DDoS attack that uses long-form field input to overwhelm the target server.
  3. 3. - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
  4. 4. - A group of computers and other devices that are connected together to share resources and information.
  5. 5. - A network of compromised computers that can be used to perform malicious activities.
  6. 6. - A method of transferring data securely across an untrusted network, by encapsulating data
  7. 8. - A protocol suite for securing Internet Protocol (IP) communications.
  8. 9. - A network security system that monitors and controls incoming and outgoing network traffic.
  9. 11. - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
  1. 1. - The study of analyzing and breaking encryption systems.
  2. 3. - A type of cyber attack in which multiple compromised systems attack a target,.
  3. 7. - A type of DDoS attack that floods a victim with ICMP echo request packets.
  4. 8. - A global network of interconnected computer networks.
  5. 10. - A security algorithm for wireless networks.