![]() | No ratings.
This puzzle has commonly used terms in the field of network security |
| TBD |
| 3 | A method to find all ports a computer is listening to | ||
| 4 | A software used to listen to all traffic on the network | ||
| 7 | A commonly used method to protect user account passwords from brute force attacks | ||
| 8 | The largest computer network in the world | ||
| 11 | Device that protects computer by selectively allowing or blocking incoming requests | ||
| 12 | Pretending to be someone else | ||
| 14 | API used in Java to make remote procedure calls | ||
| 16 | A computer has a virus | ||
| 17 | The largest and most popular Security company | ||
| 19 | A threat that spreads through emails and networks shares |
| 1 | Abbreviation of term used to uniquely address some content on the Web | ||
| 2 | Abbreviation of the company that provides your Internet connection | ||
| 3 | An email that pretends to be from someone else and requests confidential information | ||
| 5 | Method of finding a user’s password by trying all possible combinations | ||
| 6 | A network of compromised computers on the internet which are used to perform some tasks | ||
| 7 | A software that protects you against known malicious software or applications | ||
| 9 | Abbreviation of technology used to enabling multiple computers to connecting to the Internet using a single routable IP address | ||
| 10 | Abbreviation of the protection system that analyses incoming requests and determines whether they are legitimate or malicious | ||
| 13 | Sharing unauthorized content | ||
| 15 | Someone who tries to break into your computer | ||
| 16 | Short for information | ||
| 18 | IP Address is used to identify a computer on a _______ |
Submit your answers to see which words are correct and add those words into the crossword puzzle above. You can still continue working on the puzzle after you submit. |
| To clear your stored answers for this puzzle, click the "Reset" button: |