computer system security puzzle
Across
- 3. __________ is a form of impersonation.
- 6. ___________ is a network protocol analysis tool.
- 7. Code Red is a type of ___________.
- 9. ________ is a type of software designed to help the user's computer detect viruses and avoid them.
- 11. _______ is a type of antivirus program.
- 12. Keyloggers are a form of _________.
- 13. Lack of access control policy is a _______.
Down
- 1. Aircrack-ng is used for ___________ attack.
- 2. A modification is done by only authorized user.
- 4. __________ is a popular tool used for discovering networks as well as in security auditing.
- 5. _____ is independent malicious program that need not any host program.
- 8. _________ is considered as the unsolicited commercial email.
- 10. Compromising confidential information comes under ________.
- 11. A software referred to as Malicious.