1 15
2
13 14
3
17
4
5
16
6
7
8
9/10
11
12

Crossword: Network Hardening Measures

Across

1. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.

2. The process of securely exchanging keys between parties in asymmetric encryption.

3. The process of dividing a computer network into smaller subnetworks for improved security and performance.

4. Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.

5. The process of verifying that a network operates efficiently and satisfies the intended performance standards.

6. A security protocol for wireless networks that provides data confidentiality and access control mechanisms.

7. An IPsec configuration where only the payload of the IP packet is encrypted and authenticated, while the original IP header remains intact.

8. An electronic document that confirms the credibility of a sender or receiver in a network communication.

9. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.

10. The process of converting plaintext into ciphertext using an encryption algorithm and a key.

11. A set of rules that control network traffic by allowing or denying packets based on specified criteria such as source or destination IP address, port number, or protocol.

12. Information used to authenticate a user's identity, typically consisting of a username and password.

Down

13. A secure network connection that allows remote users to access a private network over the internet securely.

14. In asymmetric encryption, a key that is kept secret and used for decryption.

15. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.

16. A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.

17. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓