133 Crossword

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 5. certificate is distributed widely
  2. 7. communications security
  3. 8. for reliable, sequential data transmission
  4. 9. used to establish state
  5. 11. developed by IBM and US government
  6. 12. alternative to User Groups
  7. 15. openings in the boundary
  8. 18. causes harm and limited damage to assets
  9. 20. protects information even when it is not under your physical control
  10. 22. name translation for other services
  11. 24. for highly efficient transmission without retransmission
  12. 25. attacks control logic in industrial plants; probable target was Iranian nuclear sites
  13. 26. are protected by a boundary
  14. 27. applied to all users by default
  15. 31. Introduced with early Wi-Fi products
  16. 33. fails to detect a match between a credential and the database
  17. 36. hyper text markup language
  18. 37. create, read, update, delete
  19. 38. Found by astronomy grad student Clifford Stoll
  20. 40. will exploit minor vulnerabilities
  21. 41. selects the right file in the final directory in the path
  22. 43. can’t be modified
  23. 46. was unveiled in 2002 128-bit, 192-bit, and 256-bit keys
  24. 47. is a group of instructions
  25. 48. Something you have
Down
  1. 1. users are not all cleared for all data
  2. 2. automated host configuration
  3. 3. law based on judicial decisions
  4. 4. Tokens the most secure
  5. 6. womething you know
  6. 10. authentication may work
  7. 13. law based on legislative enactments
  8. 14. stored in a control section and executed by the CPU
  9. 16. contain text interpreted by a programming language interpreter
  10. 17. DOS attack that transmits numerous “ping” packets
  11. 19. returns details about domain ownership
  12. 21. creates botnet focused on financial fraud
  13. 23. uses the DNS to look up a name
  14. 25. structured query language
  15. 28. communications intelligence
  16. 29. an attacked system
  17. 30. overrides a global file sharing policy
  18. 32. confidential personal statements
  19. 34. divide the information into separate sets
  20. 35. first major Internet worm
  21. 38. authentication is effective
  22. 39. will cause significant disruptions and/or critical injuries to people to achieve objectives
  23. 42. two parties rely on a third party, the mediator, to help negotiate a settlement.
  24. 44. eavesdropping or sniffing
  25. 45. java server pages