Across
- 1. - The practice of secure communication in the presence of third parties.
- 2. - A type of DDoS attack that uses long-form field input to overwhelm the target server.
- 3. - A network segment that is not part of an organization's internal network, but is still accessible from the internet.
- 4. - A group of computers and other devices that are connected together to share resources and information.
- 5. - A network of compromised computers that can be used to perform malicious activities.
- 6. - A method of transferring data securely across an untrusted network, by encapsulating data
- 8. - A protocol suite for securing Internet Protocol (IP) communications.
- 9. - A network security system that monitors and controls incoming and outgoing network traffic.
- 11. - A protocol used in IPSec to provide confidentiality, integrity, and authenticity for IP packets.
Down
- 1. - The study of analyzing and breaking encryption systems.
- 3. - A type of cyber attack in which multiple compromised systems attack a target,.
- 7. - A type of DDoS attack that floods a victim with ICMP echo request packets.
- 8. - A global network of interconnected computer networks.
- 10. - A security algorithm for wireless networks.
