A method to find all ports a computer is listening to
4
A software used to listen to all traffic on the network
7
A commonly used method to protect user account passwords from brute force attacks
8
The largest computer network in the world
11
Device that protects computer by selectively allowing or blocking incoming requests
12
Pretending to be someone else
14
API used in Java to make remote procedure calls
16
A computer has a virus
17
The largest and most popular Security company
19
A threat that spreads through emails and networks shares
Down:
1
Abbreviation of term used to uniquely address some content on the Web
2
Abbreviation of the company that provides your Internet connection
3
An email that pretends to be from someone else and requests confidential information
5
Method of finding a user’s password by trying all possible combinations
6
A network of compromised computers on the internet which are used to perform some tasks
7
A software that protects you against known malicious software or applications
9
Abbreviation of technology used to enabling multiple computers to connecting to the Internet using a single routable IP address
10
Abbreviation of the protection system that analyses incoming requests and determines whether they are legitimate or malicious
13
Sharing unauthorized content
15
Someone who tries to break into your computer
16
Short for information
18
IP Address is used to identify a computer on a _______
Submit your answers to see which words are correct and add those words into the crossword puzzle above. You can still continue working on the puzzle after you submit.
To clear your stored answers for this puzzle, click the "Reset" button:
Printed from https://shop.writing.com/main/crosswords/item_id/1887381-Network-Security-Puzzle
All Writing.Com images are copyrighted and may not be copied / modified in any way. All other brand names & trademarks are owned by their respective companies.
Generated in 0.08 seconds at 6:33am on Nov 16, 2024 via server WEBX1.