133
Across
- 1. Level of Motivation that can cause significant damage to assets or some injury to persons, but not critical injury
- 3. Level of Motivation will expoit minor vulnerabilities
- 5. C in CRUD
- 7. a type of law wherein based on legislative enactments
- 8. U in CRUD
- 10. Email that tries to retrieve authentication data
- 13. Sarbaines-Oxley financial and accounting standards for public companies
- 14. spreads through email & creates a botnet that spreads spam and more malware
- 16. User ______ Protocol (UDP)
- 19. a type of law wherein based on judicial decisions
- 22. a type of law wherein based on religious systems And or documents.
- 23. protects information even when it is not under your physical control
- 27. type of Cipher Named after a 16th century author
- 28. interactive DNS resolver
- 29. a simple and popular protocol
- 31. malicious software
- 32. Risk Management ________
- 35. attacks control logic in industrial plants, probable target was Iranian nuclear sites
- 36. _______ Control Message Protocol (ICMP)
- 37. type of attack that bogus messages given to computers
- 40. type of attack that modify a system to work for the threat agent
- 43. D in CRUD
- 44. creates botnet focused on financial fraud
- 45. Secure ________ Layer (SSL)
- 46. type of token that Stores a secret that generates a different credential for each login
Down
- 1. Dynamic _________ Control Protocol (DHCP)
- 2. ____________ poisoning resolver receives a bogus response to a DNS request
- 4. type of Cipher Replace each letter in a text by the 3rd letter following it in the alphabet:
- 6. ________-Hellman (D-H),Constructs a shared secret from information shared in public
- 8. __________ Resource Locator
- 9. The ________ procedure in the operating system (OS) switches running processes
- 11. Unsolicited email; often distributes frauds
- 12. R in CRUD
- 15. first A in ARPANET
- 17. ________ contain text interpreted by a programming language interpreter
- 18. authentication for DNS responses
- 20. a key’s “safe” lifetime
- 21. ________ Worm first major Internet worm
- 24. (ACK)
- 25. set of people or devices that all share the same secret key
- 26. two parties rely on a third party, the mediator, to help negotiate a settlement.
- 30. ________ Attack, DOS attack that sends a forged “ping” using a broadcast address to amplify the number of replies produced
- 33. Transmission _______ Protocol (TCP)
- 34. type of complaint wherein a person is charged with breaking specific laws.
- 38. _________ Address Translation (NAT)
- 39. types of access control strategy Cryptography Kerckhoff,Shannon
- 41. ________ Private Networks (VPNs)
- 42. type of Tokens that Stores an unchanging credential.
- 47. a more elaborate protocol