Crossword 133

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 3. Dynamic _________ Control Protocol (DHCP)
  2. 4. U in CRUD
  3. 6. Sarbaines-Oxley financial and accounting standards for public companies
  4. 9. ________ contain text interpreted by a programming language interpreter
  5. 10. a type of law wherein based on judicial decisions
  6. 13. a type of law wherein based on legislative enactments
  7. 14. two parties rely on a third party, the mediator, to help negotiate a settlement.
  8. 17. type of Cipher Named after a 16th century author
  9. 18. D in CRUD
  10. 19. ____________ poisoning resolver receives a bogus response to a DNS request
  11. 26. Level of Motivation that can cause significant damage to assets or some injury to persons, but not critical injury
  12. 27. a key’s “safe” lifetime
  13. 28. interactive DNS resolver
  14. 30. (ACK)
  15. 33. _______ Control Message Protocol (ICMP)
  16. 36. type of attack that bogus messages given to computers
  17. 38. User ______ Protocol (UDP)
  18. 40. spreads through email & creates a botnet that spreads spam and more malware
  19. 42. types of access control strategy Cryptography Kerckhoff,Shannon
  20. 45. R in CRUD
  21. 46. _________ Address Translation (NAT)
  22. 47. a more elaborate protocol
Down
  1. 1. C in CRUD
  2. 2. authentication for DNS responses
  3. 5. type of Tokens that Stores an unchanging credential.
  4. 6. type of attack that modify a system to work for the threat agent
  5. 7. type of complaint wherein a person is charged with breaking specific laws.
  6. 8. ________ Worm first major Internet worm
  7. 11. Transmission _______ Protocol (TCP)
  8. 12. malicious software
  9. 15. creates botnet focused on financial fraud
  10. 16. Level of Motivation will expoit minor vulnerabilities
  11. 20. set of people or devices that all share the same secret key
  12. 21. Email that tries to retrieve authentication data
  13. 22. Secure ________ Layer (SSL)
  14. 23. The ________ procedure in the operating system (OS) switches running processes
  15. 24. Risk Management ________
  16. 25. protects information even when it is not under your physical control
  17. 29. a type of law wherein based on religious systems And or documents.
  18. 31. ________ Private Networks (VPNs)
  19. 32. attacks control logic in industrial plants, probable target was Iranian nuclear sites
  20. 34. Unsolicited email; often distributes frauds
  21. 35. a simple and popular protocol
  22. 37. type of Cipher Replace each letter in a text by the 3rd letter following it in the alphabet:
  23. 39. first A in ARPANET
  24. 41. type of attack in which maliciously create or modify
  25. 43. __________ Resource Locator
  26. 44. ________ Attack, DOS attack that sends a forged “ping” using a broadcast address to amplify the number of replies produced