My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Wireless Security Part I

Identify which of the words from the word list that the "Across" and "Down" statements are referring to. 
Horizontales
A harmless practice that anonymously sends business cards to a Bluetooth recipient
The interception and decoding of wireless transmissions.
The degree of protection against danger, damage, loss, and criminal activity.
Ensuring that a system is up so that data is available when needed.
A technique that hackers use to find wireless networks.
Ensuring that data is not disclosed to unintended persons.
Any unauthorized access point added to a network. Several techniques are used to create a rogue access point.
When an attacker gains unauthorized access to an existing Bluetooth connection
The person or entity that carries out a threat.
Is the most effective type of Wi-Fi interference attack.
An opening or weakness in the system.
Verticales
Interference caused by nearby wireless devices, such as cordless phones or microwave ovens.
A procedure, a piece of software, or a sequence of commands that takes advantage of a vulnerability to actually carry out an attack.
Anything that has the potential to cause the loss of an asset.
Ensuring that data is not modified or tampered with.
Providing the validation of a message's origin.
When an attack spoofs your MAC address and then tells your wireless network to disconnect you from the network.
Something that has value to an individual or an organization.