Information Security-unit-1
Across
- 3. first phase of sec sdlc
- 4. probability of threat to system
- 6. replicating malicious software that spreads throughout system
- 11. makes server unavailable by flooding
- 13. provides assurance that user has authority to access update or delete
- 15. intentional or unintentional attempt to compromise information
- 16. using social skills to access credentials
- 17. program that monitor data travelling over a network
- 18. a pillar of IS
- 19. attacker routes large quantities of email to targer
Down
- 1. automated process that interacts with other network services
- 2. bypasses normal authentication process
- 5. only those with sufficient privilege can access
- 6. weakness or faults in a system
- 7. intruder assumes a trusted ip address
- 8. organizational Resources that is being protected
- 9. attack which uses trial and error
- 10. unsolicited commercial email
- 12. proving identity that he or she claims
- 14. potential danger to an asset