133 Crossword

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 1. Restrict on sending or receiving address
  2. 5. creates botnet focused on financial fraud
  3. 6. attacks control logic in industrial plants; probable target was Iranian nuclear sites
  4. 7. hyper text markup language
  5. 14. a coil of wire and a magnetic surface
  6. 15. divide the information into separate sets
  7. 16. certificate is distributed widely
  8. 19. Unreliable tricks to replace an existing key
  9. 21. availability again
  10. 24. an availability attack
  11. 25. alternative to User Groups
  12. 26. emails that warn of a computer security risk and recommend forwarding to everyone – not how we distribute such warnings
  13. 29. Restrict according to whether the traffic was initiated inside or outside of the site
  14. 30. uses the DNS to look up a name
  15. 31. redirects visitors to a site masquerading as the real site
  16. 32. system works on behalf of the wrong user
  17. 35. womething you know
  18. 36. lets a client program retrieve email from a server
  19. 37. Tokens the most secure
  20. 40. modify a system to work for the threat agent
  21. 41. are protected by a boundary
  22. 42. will cause significant disruptions and/or critical injuries to people to achieve objectives
  23. 45. law based on judicial decisions
  24. 47. protects information even when it is not under your physical control
  25. 49. for highly efficient transmission without retransmission
  26. 50. DOS attack that transmits numerous “ping” packets
Down
  1. 2. Examine application-level data to detectviolations of specific restrictions
  2. 3. users are not all cleared for all data
  3. 4. openings in the boundary
  4. 8. Could steal computer assets or storage
  5. 9. Sections Contain instructions to execute and Contain unchanging data
  6. 10. eavesdropping or sniffing
  7. 11. authentication may work
  8. 12. Restrict on TCP or UDP port number
  9. 13. a simple and popular protocol
  10. 17. developed by IBM and US government
  11. 18. transmits an email toanother server for delivery to its destination
  12. 20. overrides a global file sharing policy
  13. 22. was unveiled in 2002 128-bit, 192-bit, and 256-bit keys
  14. 23. can’t be modified
  15. 27. structured query language
  16. 28. selects the right file in the final directory in the path
  17. 29. Sections Contain variables that change and also Contain “free form” RAM
  18. 32. first major Internet worm
  19. 33. Found by astronomy grad student Clifford Stoll
  20. 34. one party acts against another based on a shared relationship. For example, an employer disciplines or fires an employee
  21. 36. two parties rely on a third party, the mediator, to help negotiate a settlement.
  22. 38. Something you have
  23. 39. Introduced with early Wi-Fi products
  24. 43. an attacked system
  25. 44. automated host configuration
  26. 46. create, read, update, delete
  27. 48. is a group of instructions