My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Networking and Network Security Crossword

Hint: Many of the answers to the clues below appear in the titles of the papers here:  https://users.ece.cmu.edu/~vsekar/publications/
Horizontales
A measure of randomness, both in information theory and physics.
The act of breaking in or to enter unauthorized. Also a prefix in front of "Detection" or "Prevention" in security parlance.
Popular open-source network vulnerability scanner.
Often looks like 8-Down, but maybe a result of a HackerNews post directing a lot of traffic to your site.
Proof-of-work, abbreviated.
Without this your websites would be terribly slow.
Is this biological or wireless?
Gzip helps you do this to files.
Using power or sound to extract secrets could be this.
Internet Service Provider; abbreviated.
Most of the traffic on the Internet is of this application type.
Software-defined networking; abbreviated.
The biggest observed incidents of 8-Down type attacks use this strategy to magnify volume.
Internet of Things; abbreviated.
Docker for instance.
Turing award winners initials who established foundations of public key cryptography.
What you don't have when Big Brother is watching?
Prefix that can be used with graph, surface, vector denoting adversarial action.
Prefix used before queueing in networking to denote equitable allocation.
Contrast to a physical network, an adjective used to denote a type of a logical network.
Used in hardware and software engineering to make sure there are no bugs; e.g., using fuzzing.
Verticales
Botnet attack from 2016, with a name inspired by Anime.
Page views or time spent is used to measure this; a term used to specify how users like your product.
Generative Adversarial Networks; abbreviated
Drawing in common usage, but also used to indicate approximate streaming data structures for monitoring.
What you want to do in the aftermath of an intrusion to trace attackers, CSI style.
Large-scale attacks that can take down Internet services.
Common "hyper text" protocol used for web; abbreviated
What you specify to indicate what network firewalls must allow or drop.
Early bird catches this, but you don't want it on the Internet!
Complements 29Ac to avoid bugs before deployment.
Physical, MAC, Transport, Application are types of these in a networking stack.
Firewalls, IDS, proxies are broadly referred to by this collective term from RFC 3234.
Observing and analyzing networks for anomalies and attacks.
Public Key Infrastructure; abbreviated.
NATs, load balancers, and firewalls, are referred to as this type of network functions indicating they track packet history.
Network Interface Card; abbreviated.
Captchas, for example to tell humans and bots apart, or what you are solving now, a type of ___
Control area network inside your car; abbreviated.
You probably want to use this for privacy while browsing in an airport or a coffeeshop, a type of private network.
Local area network briefly.