1/11 12
2 14
3
18
16
15 4
17 5 19
6 13
7
8
9
10

Crossword: Networks & the internet

Across

1. Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.

2. A widely used technology for wired LANs that allows devices to communicate with each other.

3. The process of managing or controlling the flow of network traffic to improve performance, prioritize certain types of traffic, or prevent congestion.

4. In asymmetric encryption, a key that is kept secret and used for decryption.

5. A globally unique IP address that is assigned to a device connected to a public network.

6. The capability of a cloud storage client to allow users to access and work on their files even without an internet connection, with changes automatically synced when online.

7. A network device that modulates and demodulates signals to establish and maintain a connection with an ISP

8. The use of personal area networks to track and monitor the location of individuals or objects, often used for navigation, asset tracking, or geofencing.

9. In asymmetric encryption, a key that is publicly available and used for encryption.

10. the power of a Wi-Fi signal, typically measured in decibels

Down

11. A type of HTTP cookie that is stored on the user's computer for a longer period of time and remains even after closing the web browser.

12. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.

13. The process of automatically making files available on multiple devices by keeping them up-to-date across all platforms through cloud storage.

14. a physical location where people can access the internet, typically using Wi-Fi

15. The capacity of a network to transmit data

16. Software that secretly gathers information about a person or organization without their knowledge, typically for malicious purposes.

17. A data structure in a networking device that maps MAC addresses to physical ports.

18. A protocol used for the transmission of data over the internet, often used to retrieve web pages and other resources.

19. A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓