Create a crossword puzzle coming from ideas of student. Afterwards, get the definition of those terminologies
in your own words
Across
1. From Cryptography, it is the algorithm for transforming plain text to cipher text
4. The fundamental principle of keeping information and communications private and protecting them
from unauthorized access
6. A device that filters and forwards packets between LAN segments. A typical switch has numerous
physical ports, each acting as a connection point for a network segment.
7. The fundamental principle of ensuring that systems operate continuously and that authorized persons
can access the data that they need.
9. To decode data that has been encrypted, turning it back into plain text
10. A term often used to describe the main network connections composing the Internet
11. A network device that regenerates signals so that they can travel farther along a cable without losing
or distorting data. A ******* is not as smart as a router, but it can relay messages between
subnetworks that use different protocols or cable types
13. Is a method of cipher and an ancient encryption system created in the Middle East.
17. The user-friendly address that identifies the location of a Web site, such as
http://www.watchguard.com.
19. A set of formal rules describing how to transmit data, especially across a network
25. Is a code that is intended to take full or partial control of a system at the lowest levels
27. The main printed circuit board in a computer, which contains sockets that accept additional boards
34. Also called a security ***** or an authentication *****. Something a person has that evidences
validity, or identity. It is usually a hardware device that resembles a hand-held calculator, since it often
has some sort of display and perhaps a keypad for entering numbers. ***** achieve the goal of "two-
factor authentication," considered a strong standard of security when validating who a user is, because
accessing a network that uses ****** requires two factors: something the person knows (a password)
and something the person has (the *****).
36. An electronic document attached to someone's public key by a trusted third party, which attests that
the public key belongs to a legitimate owner and has not been compromised. __________ are intended
to help you verify that a file or message actually comes from the entity it claims to come from
37. The process of identifying an individual, usually based on a user name and password.
41. A device that serves as a common connection point for multiple devices on a network. There are
several different types of hubs, but in general each receives and sends signals to all the devices
connected to it
43. Unsolicited commercial e-mail sent to many recipients, much like an electronic version of junk mail
44. A generic term for computer equipment such as a hub, switch, router, or printer
49. The action of stopping any form of attack from happening or going into the network/system
52. The sequence of computerized devices through which information travels to reach its target machine.
Each device the information travels through delineates one stage of the *******, referred to as a
"hop."
53. A software program that manipulates a device (such as a printer, keyboard, mouse, or hard drive). The
__________ accepts generic commands from a program and then translates them into specialized
commands for the device
54. A set of rules that enables a broad spectrum of different kinds of computers to establish a connection
and exchange streams of data
55. Are the countermeasures that you need to put in place to avoid, mitigate, or counteract security risks
due to threats or attacks
60. A secret code, most often expressed as a numeric value, used to encrypt a message, to make the text
unreadable to anyone but the intended recipient.
61. A business that sells access to the Internet. A government bureau or an educational institution may be
the ******* for some organizations.
62. A name or phrase that appears when the mouse pointer pauses over a button or icon
64. The process of disguising data to hide its content. As used in a network security context, __________
is usually accomplished by putting the data through any of several established mathematical
algorithms developed specifically for this purpose
65. A boundary across which two independent systems meet and act on or communicate with each other
66. Is an installed malicious software that is intended to track and report the usage of a target system, or
collect other data the author wishes to obtain
68. A piece of hardware used to connect two local area networks, or segments of a LAN, so that devices on
the network can communicate without requiring a router
70. Is a one-way encryption that transforms cleartext into ciphertext that is not intended to be decrypted.
73. The part of accounting in which a security professional examines logs of what was recorded.
75. A remote control program typically found on Unix systems in TCP/IP networks.
76. Software or hardware components that restrict access between a protected network and the Internet,
or between other sets of networks, to block unwanted use or abuse
77. A shortened version of "modulator/demodulator," this is the word for a communications device that
sends computer transmissions over a standard telephone line
80. A self-replicating program that seeks access into other computers by exploiting security flaws
82. A unit of information formatted according to specific protocols that allow precise transmittal of data
from one node in a network to another
87. is a hardware key for securing access to a licensed software application and establishing a chain of
trust
89. A section of a network. Typically, a ******* is thought of as ending where it reaches a router or a
routing device (such as the Firebox).
92. Is a piece of code that spreads from one computer to another by attaching itself to other files through
a process of self-replication
93. A text file passed from the Web server to the Web client (a user's browser) that is used to identify a
user and could record personal information such as ID and password, mailing address, credit card
number, and more. A __________ is what enables your favorite Web site to "recognize" you each time
you revisit it
94. s a methodology and group of technologies for the delivery of voice communications and multimedia
sessions over Internet Protocol (IP) networks, such as the Internet.
98. is a short-range wireless connectivity standard that uses magnetic field induction to enable
communication between devices when they're touched together, or brought within a few centimeters of
each other.
16. To compact a file or group of files so that they occupy less disk
space.
47. An attack where the attacker tries to trick the victim into giving
up sensitive information by masquerading as a trusted entity
64. Any network incident that prompts some kind of log entry or
other notification.
71. abstracts the idea of the local area network (LAN) by providing
data link connectivity for a subnet. It is also a virtual LAN