My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Network Security Monitoring

Across
Software or hardware components that restrict access between a protected network and the Internet, or between other sets of networks, to block unwanted use or abuse.
A device that filters and forwards packets between LAN segments.
A means of regaining access to a compromised system by installing software or configuring existing software to enable remote access under attacker-defined conditions.
A threat agent.
A common networking standard with the ability to connect a diverse array of systems. This is one of the underlying protocols of the Internet.
The sequence of computerized devices through which information travels to reach its target machine.
An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives using multiple attack vectors (NIST SP800-61).
To record details of information or events in an organized record-keeping system, usually sequenced in the order in which they occurred.
A device, connected to at least two networks, which receives and sends data packets between those networks.
A unit of information formatted according to specific protocols that allow precise transmittal of data from one node in a network to another.
A partially-protected zone on a network, not exposed to the full fury of the Internet, but not fully behind the firewall. This technique is typically used on parts of the network which must remain open to the public (such as a Web server) but must also access trusted resources (such as a database).
Down
A network transmission sent to all nodes on a network.
Altering data packets to falsely identify the originating computer.
A protocol used to pass control and error messages back and forth between nodes on the Internet.
A series of bytes at the beginning of a communication packet that provides information about the packet such as its computer of origin, the intended recipient, packet size, and destination port number.
A packet of data that contains information, plus origin and destination addresses. Generally used in reference to UDP and ICMP packets when talking about IP protocols.
Any event that is not part of the standard operation of a service and that causes, or may cause, an interruption to, or a reduction in, the quality of that service.
Full use of a vulnerability for the benefit of an attacker
A set of standards for transmitting data over networks.
A device that sends and receives data between the computer and the network cabling. Every computer attached to a network must have this.