1 13
11 2
3 15 17
16
4
12 18
5
6
7 14
8
9 10

Crossword: Networking & The internet

Across

1. A wireless network that uses satellites to provide coverage over large geographic areas, often used for communication in remote locations.

2. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.

3. A label is designated to a device that is linked to a computer network.

4. A type of HTTP cookie that is stored on the user's computer for a longer period of time and remains even after closing the web browser.

5. A digital ledger that records transactions across multiple computers. It is the underlying technology behind many digital currencies.

6. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.

7. A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.

8. A cookie used to track the browsing behavior of the user across different websites.

9. Open Systems Interconnection model, a conceptual framework that standardizes the functions of a communication system into seven layers.

10. Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.

Down

11. The transmission of information between devices without the use of physical connections or cables.

12. Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.

13. A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

14. A set of rules and procedures governing the transmission of data between devices on a computer network.

15. A temporary and spontaneous wireless network formed between devices for a specific purpose without the need for a central infrastructure.

16. A network topology where all the devices or nodes can act as both clients and servers to each other.

17. A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.

18. The process of filtering and validating user input before using it in an application.


🖶

Shortcuts

Left: ⇤ Right: ⇥ Up: ↑ Down: ↓