Cyber Security Review

1234567891011121314151617181920212223242526272829303132333435363738394041424344
Across
  1. 4. Use IP Address to pass the data between networks
  2. 5. Reduce collisions because split the
  3. 8. is software/hardware based network security system that controls the in and out network traffic
  4. 11. _____________ Control Protocol
  5. 12. Downloads onto a computer disguised as a legitimate program
  6. 15. software intentionally designed to harm a network, server, or computer
  7. 16. Data arriving to a _____ port is repeated on all the other ports
  8. 17. Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
  9. 18. Intentionally disrupting, defacing or destroying a Web site
  10. 19. Destroy data when certain conditions are met
  11. 21. is an object, person, or other entity that represents a constant danger to an asset
  12. 22. is a flexible filament of very clear glass capable of carrying information in the form of light
  13. 23. This address is a 48 bits long binary number unique for every network card
  14. 28. A type of software security
  15. 32. These IPs do not change. Whether you
  16. 35. translates the locally significant source address into a globally unique address
  17. 36. Is a device that plugs into a motherboard and provides ports for the network cable connections
  18. 37. Doesn’t needs user intervention to replicates
  19. 38. These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
  20. 39. Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
  21. 40. is a series of LANs linked together to form a network in an extended area
  22. 41. Type of network that consists of a series of computers linked together to form a network in a circumscribed location
  23. 42. person who intends to gain unauthorized access to a computer systems
  24. 43. It forward the information based on MAC address list and ports
  25. 44. your machine or reboot your router it remains the
Down
  1. 1. Topology in which all nodes indirectly connect to each other through one or more switches
  2. 2. A group of computers and associated devices that are connected by communications facilities
  3. 3. These losses refer to damages of the operating capability of an organisation
  4. 4. Its purpose is to regenerate signals distorted by transmission loss due to attenuation
  5. 6. is a network that is spread over a very small area
  6. 7. domains
  7. 8. These losses refer to damages to the wealth of an organisation
  8. 9. Activated when infected program is loaded in memory and executed by its own or a user action
  9. 10. between computers on a network plural)
  10. 13. In this topology data travels in one direction using a control signal called a ‘token’
  11. 14. Fraudulent email leading to a fraudulent website
  12. 20. Network topology where all the nodes are joined to one cable
  13. 24. The practice and study of techniques for secure communication
  14. 25. A type of physical security
  15. 26. cable type that is commonly used on Ethernet networks
  16. 27. is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  17. 29. to a computing device or node when it’s connected to a network
  18. 30. is a temporary IP address that is
  19. 31. Is a set of rules that governs the
  20. 33. occurs when someone steals your personal information to commit crimes in your name
  21. 34. the process of converting plaintext to ciphertext