Chapter 13 CIS 25
Across
- 1. Network segment for public-facing services
- 4. Automatically running programs from media
- 8. Grouping objects within Active Directory
- 9. Access rights granted to users
- 11. Reusing captured data to gain access
- 12. Enticing victims to reveal sensitive information
- 14. Observing someone’s private information
- 16. Vulnerability exploited before being patched
- 17. Corrupting DNS data to redirect traffic
- 20. Self-replicating malware spreading across networks
- 21. Unauthorized entry by following authorized person
- 22. Unsolicited, often irrelevant, bulk messages
- 23. Pretending to be someone else
- 27. Retrieving sensitive information from trash
- 29. Malware encrypting files, demanding ransom payment
- 30. Full disk encryption for Windows systems
- 31. Overloading a system to deny service
Down
- 2. Directory service for Windows domain networks
- 3. Guidelines for protecting information assets
- 5. Faking identity to gain unauthorized access
- 6. Double-door system for controlled access
- 7. Rules for creating and managing passwords
- 10. Malicious software disguised as legitimate
- 13. Manipulating people to divulge information
- 15. Gathering information about a target system
- 18. Targeted phishing aimed at specific individuals
- 19. Database of known malware signatures
- 24. Overwhelming server with connection requests
- 25. Hardware-based security for cryptographic operations
- 26. Erasing data from magnetic storage
- 28. Software providing unauthorized access to systems