Anda di halaman 1dari 8

Activity 1-0

Terminologies in Network Security

Create a crossword puzzle coming from ideas of student. Afterwards, get the definition of those terminologies
in your own words
Across
1. From Cryptography, it is the algorithm for transforming plain text to cipher text

4. The fundamental principle of keeping information and communications private and protecting them
from unauthorized access

5. Is a software that automatically displays or downloads unsolicited advertisements when it is used.

6. A device that filters and forwards packets between LAN segments. A typical switch has numerous
physical ports, each acting as a connection point for a network segment.

7. The fundamental principle of ensuring that systems operate continuously and that authorized persons
can access the data that they need.

9. To decode data that has been encrypted, turning it back into plain text

10. A term often used to describe the main network connections composing the Internet

11. A network device that regenerates signals so that they can travel farther along a cable without losing
or distorting data. A ******* is not as smart as a router, but it can relay messages between
subnetworks that use different protocols or cable types

13. Is a method of cipher and an ancient encryption system created in the Middle East.

17. The user-friendly address that identifies the location of a Web site, such as
http://www.watchguard.com.

19. A set of formal rules describing how to transmit data, especially across a network

20. A utility to determine whether a specific IP address is accessible

22. An attempt to break into a system.

25. Is a code that is intended to take full or partial control of a system at the lowest levels

26. A network transmission sent to all nodes on a network

27. The main printed circuit board in a computer, which contains sockets that accept additional boards

34. Also called a security ***** or an authentication *****. Something a person has that evidences
validity, or identity. It is usually a hardware device that resembles a hand-held calculator, since it often
has some sort of display and perhaps a keypad for entering numbers. ***** achieve the goal of "two-
factor authentication," considered a strong standard of security when validating who a user is, because
accessing a network that uses ****** requires two factors: something the person knows (a password)
and something the person has (the *****).

36. An electronic document attached to someone's public key by a trusted third party, which attests that
the public key belongs to a legitimate owner and has not been compromised. __________ are intended
to help you verify that a file or message actually comes from the entity it claims to come from

37. The process of identifying an individual, usually based on a user name and password.
41. A device that serves as a common connection point for multiple devices on a network. There are
several different types of hubs, but in general each receives and sends signals to all the devices
connected to it

43. Unsolicited commercial e-mail sent to many recipients, much like an electronic version of junk mail

44. A generic term for computer equipment such as a hub, switch, router, or printer

46. From Cryptography, it is the encoded message

49. The action of stopping any form of attack from happening or going into the network/system

52. The sequence of computerized devices through which information travels to reach its target machine.
Each device the information travels through delineates one stage of the *******, referred to as a
"hop."

53. A software program that manipulates a device (such as a printer, keyboard, mouse, or hard drive). The
__________ accepts generic commands from a program and then translates them into specialized
commands for the device

54. A set of rules that enables a broad spectrum of different kinds of computers to establish a connection
and exchange streams of data

55. Are the countermeasures that you need to put in place to avoid, mitigate, or counteract security risks
due to threats or attacks

60. A secret code, most often expressed as a numeric value, used to encrypt a message, to make the text
unreadable to anyone but the intended recipient.

61. A business that sells access to the Internet. A government bureau or an educational institution may be
the ******* for some organizations.

62. A name or phrase that appears when the mouse pointer pauses over a button or icon

64. The process of disguising data to hide its content. As used in a network security context, __________
is usually accomplished by putting the data through any of several established mathematical
algorithms developed specifically for this purpose

65. A boundary across which two independent systems meet and act on or communicate with each other

66. Is an installed malicious software that is intended to track and report the usage of a target system, or
collect other data the author wishes to obtain

68. A piece of hardware used to connect two local area networks, or segments of a LAN, so that devices on
the network can communicate without requiring a router

70. Is a one-way encryption that transforms cleartext into ciphertext that is not intended to be decrypted.

73. The part of accounting in which a security professional examines logs of what was recorded.

75. A remote control program typically found on Unix systems in TCP/IP networks.

76. Software or hardware components that restrict access between a protected network and the Internet,
or between other sets of networks, to block unwanted use or abuse
77. A shortened version of "modulator/demodulator," this is the word for a communications device that
sends computer transmissions over a standard telephone line

79. From Cryptography, it is the original message

80. A self-replicating program that seeks access into other computers by exploiting security flaws

81. A type of hacking attempt characterized by repetitious, sequential access attempts

82. A unit of information formatted according to specific protocols that allow precise transmittal of data
from one node in a network to another

84. An acronym for File Transfer Protocol

87. is a hardware key for securing access to a licensed software application and establishing a chain of
trust

89. A section of a network. Typically, a ******* is thought of as ending where it reaches a router or a
routing device (such as the Firebox).

92. Is a piece of code that spreads from one computer to another by attaching itself to other files through
a process of self-replication

93. A text file passed from the Web server to the Web client (a user's browser) that is used to identify a
user and could record personal information such as ID and password, mailing address, credit card
number, and more. A __________ is what enables your favorite Web site to "recognize" you each time
you revisit it

94. s a methodology and group of technologies for the delivery of voice communications and multimedia
sessions over Internet Protocol (IP) networks, such as the Internet.

96. The meaning of "D" in the acronym of DNS

98. is a short-range wireless connectivity standard that uses magnetic field induction to enable
communication between devices when they're touched together, or brought within a few centimeters of
each other.

99. is the retraction of certification or authorization.


Down
1. A computer process that requests a service from another computer
and accepts the server's responses

2. The meaning of "P" in ISP

3. Is any condition that leaves a system open to harm

4. The art and science of encoding and decoding messages using


mathematical algorithms that utilize a secret key

8. The meaning of "I" in the acronym of IP

12. messages distributed by electronic means from one computer


user to one or more recipients via a network.

14. A wiring configuration used for a network. Also referred to as a


network's architecture.

15. The fundamental principle of keeping organization information


accurate, free of errors and without unauthorized modifications.

16. To compact a file or group of files so that they occupy less disk
space.

18. A process to retrieve vital data from a crashed system or data


storage devices

21. A system that provides access between two or more networks.


******* are typically used to connect networks that are dissimilar.
The Firebox often serves as the ******* between the Internet and
your network

23. Is any event or action that could potentially cause damage to


an asset

24. Recording the time when an event happens (typically in a log)


or when a piece of information is created or modified

28. Are authentication schemes based on the identification of


individuals by their physical characteristics

29. the process of tracking recording system activities and


resource access
30. Is an alternative cipher process that hides information by
enclosing it in another file such as a graphic, movie, or sound file

31. In cryptography, a mathematical measurement of the amount


of uncertainty or randomness

32. One of the least expensive, most widely deployed networking


standards, enabling the transmission of data at 10 million bits per
second (Mbps), using a specified protocol. A more recent
__________ standard, called 100BaseTx, enables data to be
transmitted and received at 100 Mbps.

33. is a network that interconnects users with computer resources


in a geographic area or region larger than that covered by even a
large local area network (LAN) but smaller than the area covered by
a wide area network (WAN)

35. A subdivision of a network that uses a sequential range of IP


addresses (i.e. 10.45.32.1 to 10.45.32.128). Administrators divide
large networks into subnets for many reasons. One reason

38. Is a set of computers that has been infected by a control


program called a bot that enables attackers to collectively exploit
those computers to mount attacks

39. The meaning of "M" in MD5

40. The meaning of "S" in the acronym DoS

41. An object on a Web page such as a graphic or underlined text


that represents a link to another location, either on the same Web
site or on a different Web site.

42. The visual representation on a computer screen that allows


users to view, enter, or change information. It is characterized by
icons and commonly utilizes a mouse, in contrast to a Command Line
Interface (CLI), which uses strictly text.

45. A protocol for sending electronic mail between servers

47. An attack where the attacker tries to trick the victim into giving
up sensitive information by masquerading as a trusted entity

48. To convey official access or legal power to a person or entity.

50. Cryptography comes from one of the the Greek words:


********** = meaning hidden
51. Occurs when a user/machine is discovered trying to access
unauthorized data or after information has been lost

55. It is short for Command Line Interface

56. Is a concept that indicates exposure to the chance of damage


or loss.

57. Altering data packets to falsely identify the originating


computer. Spoofing is generally used when a hacker wants to make
it difficult to trace where the attacks are coming from.

58. A computer network that spans a relatively small area,


generally confined to a single building or group of buildings

59. A self-contained network with a limited number of participants


who extend limited trust to one another in order to accomplish an
agreed-upon goal.

63. Is insidious and difficult to remove, so it can cause a significant


amount of damage in many different ways.

64. Any network incident that prompts some kind of log entry or
other notification.

67. a facility allowing computers, smartphones, or other devices to


connect to the Internet or communicate with one another wirelessly
within a particular area.

68. is an error, flaw, failure or fault in a computer program or


system that causes it to produce an incorrect or unexpected result,
or to behave in unintended ways.

69. The meaning of "D" in the acronym DoS

71. abstracts the idea of the local area network (LAN) by providing
data link connectivity for a subnet. It is also a virtual LAN

72. is a geographically distributed private telecommunications


network that interconnects multiple local area networks (LANs)

74. Occurs when an attacker accesses a computer system without


the authorization to do so.

78. A byte. Used instead of "byte" in most IP documents because


historically many hosts did not use 8-bit bytes
83. A computer that provides shared resources to network users.
The network users are often referred to as clients of that ******

85. A secret sequence of characters or a word that a user submits


to a system for purposes of authentication, validation, or verification

86. To expand a compressed file or group of files back to their


normal size so that the file or files can be opened.

88. The meaning of "D" in MD5

90. The rate at which a network segment can transfer data

91. In Virtual Private Networks (VPN), an encrypted connection


between sites. Only the originator and the receiver of the message
see it in its clear state. Any hacker trying to intercept the message
en route gets nothing but a scrambled mess. Because the path of a
VPN message has "light" (clear text) at each end but "darkness"
(obscurity) at all the between-points, it is called, metaphorically, a
VPN tunnel.

93. One who breaks security on a system without authorization

95. A physical hole in a computing device where you plug


something in (such as, "this PC communicates with the printer via
the serial *******").

97. A tiny bit of near-random data inserted where too much


predictability would be undesirable. In cryptography, ****** is a
random string that is added onto passwords (or random numbers)
before an algorithm is performed on the password. The extra data
effectively lengthens and obscures the password, making the cipher
text less susceptible to dictionary attacks

Anda mungkin juga menyukai