My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Network Security Crossword

Horizontales
Public Key Infrastructure; abbreviated
NATs, load balancers, firewalls, are these type of non-memory-less network functions
Could be trying to make sure there are no bugs
Guards eat me to specify what network firewalls must implement
Most of the traffic on the Internet is of this application type!
Oxidized iron muddled with charged particle to enter unauthorized
Prefix that can be used with graph, surface, vector denoting adversarial action
Complements 5A to avoid bugs before deployment
Gzip does this to text files.
The biggest known types of 26Dn of late use this strategy to magnify
Page views or time spent is used to measure this, how users like your product
Internet of Things; abbreviated
Popular network vulnerability scanner
Often looks like 26Dn, but maybe a result of a hacker news post.
What you don't have when Big Brother is watching?
Early bird catches this, but you don't want it on the Internet!
Crash exchanging you for me for attackers cooperation
Resourceful product or company
Docker; e.g.,
Drawing for creating a compact summary data structure
Verticales
Turing award winners who established foundations of public key cryptography
Captcha, for example to tell humans and bots apart.
Treat mixed with h to get danger
Botnet attack from 2016 inspired by Anime
Using power or sound to extract secrets could be this
Generative Adversarial Network; abbreviated
City user jumbled up to ensure safety
Anchoring to tin mixed up to observe and analyze networks
Is this biological or wireless?
Without these websites would be terribly slow.
Probably want to use this for safe browsing in an airport
Main routing protocol between ISPs, often broken
Firewalls, IDS, proxies are broadly referred to by these term from RFC 3234
This type of large-scale attack can take down Internet services
What you want to do in the aftermath of 10Ac to trace attackers