Crossword 133
Across
- 3. Dynamic _________ Control Protocol (DHCP)
- 4. U in CRUD
- 6. Sarbaines-Oxley financial and accounting standards for public companies
- 9. ________ contain text interpreted by a programming language interpreter
- 10. a type of law wherein based on judicial decisions
- 13. a type of law wherein based on legislative enactments
- 14. two parties rely on a third party, the mediator, to help negotiate a settlement.
- 17. type of Cipher Named after a 16th century author
- 18. D in CRUD
- 19. ____________ poisoning resolver receives a bogus response to a DNS request
- 26. Level of Motivation that can cause significant damage to assets or some injury to persons, but not critical injury
- 27. a key’s “safe” lifetime
- 28. interactive DNS resolver
- 30. (ACK)
- 33. _______ Control Message Protocol (ICMP)
- 36. type of attack that bogus messages given to computers
- 38. User ______ Protocol (UDP)
- 40. spreads through email & creates a botnet that spreads spam and more malware
- 42. types of access control strategy Cryptography Kerckhoff,Shannon
- 45. R in CRUD
- 46. _________ Address Translation (NAT)
- 47. a more elaborate protocol
Down
- 1. C in CRUD
- 2. authentication for DNS responses
- 5. type of Tokens that Stores an unchanging credential.
- 6. type of attack that modify a system to work for the threat agent
- 7. type of complaint wherein a person is charged with breaking specific laws.
- 8. ________ Worm first major Internet worm
- 11. Transmission _______ Protocol (TCP)
- 12. malicious software
- 15. creates botnet focused on financial fraud
- 16. Level of Motivation will expoit minor vulnerabilities
- 20. set of people or devices that all share the same secret key
- 21. Email that tries to retrieve authentication data
- 22. Secure ________ Layer (SSL)
- 23. The ________ procedure in the operating system (OS) switches running processes
- 24. Risk Management ________
- 25. protects information even when it is not under your physical control
- 29. a type of law wherein based on religious systems And or documents.
- 31. ________ Private Networks (VPNs)
- 32. attacks control logic in industrial plants, probable target was Iranian nuclear sites
- 34. Unsolicited email; often distributes frauds
- 35. a simple and popular protocol
- 37. type of Cipher Replace each letter in a text by the 3rd letter following it in the alphabet:
- 39. first A in ARPANET
- 41. type of attack in which maliciously create or modify
- 43. __________ Resource Locator
- 44. ________ Attack, DOS attack that sends a forged “ping” using a broadcast address to amplify the number of replies produced