Across
- 1. Hacker change its IP address
- 3. Layer 3 device
- 4. One way function
- 7. Intelligent hub
- 8. Gatekeeper to a network
- 10. World wide web
Down
- 2. One change its identity
- 5. Type of attack where available resources are hijacked
- 6. Integrated service _______ network
- 9. Confidentiality provided by
