ICS 133

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 4. spreads through email, creates a botnet that spreads spam and more malware
  2. 6. will cause significant disruptions and/or critical injuries to people to achieve objectives
  3. 12. two parties rely on a third party, the mediator, to help negotiate a settlement
  4. 14. applies effort, but minor vulnerabilities
  5. 15. reputable sources for the information
  6. 17. other name of Conficker
  7. 18. a law based on judicial decisions
  8. 19. attacks control logic in industrial plants
  9. 22. security standards for federal computer systems
  10. 24. encrypt data readable only by the recipient
  11. 26. disruption of transmissions
  12. 28. An attack system that is unsafe to use
  13. 31. establish a protected area around sensitive devices and block attackers from area
  14. 32. uses the DNS to look up a name
  15. 33. causes harm and limited damage to assets
  16. 35. Developed by IBM and US government
  17. 36. creates a botnet focused on financial fraud
  18. 37. data from one machine masks others
  19. 39. keep information secret
  20. 40. exploit minor vulnerabilities
  21. 41. protects information even when it is not under your physical control
  22. 44. bogus messages given to computers
  23. 47. Protecting information from improper changes
  24. 48. A botnet and spam package that used to produce 7 million messages a day
  25. 49. contain text interpreted by a programming language interpreter
Down
  1. 1. standards for protecting personal financial information
  2. 2. protect the assets
  3. 3. data resides in _____
  4. 5. _____ agent tries to attack assets
  5. 7. malicious software
  6. 8. security standards for certain types of personal health data
  7. 9. protect traffic from two risks
  8. 10. put acoustical and electromagnetic shields around the equipment
  9. 11. adjust the device to use less power and radiate a weaker signal
  10. 13. attack on confidentiality
  11. 16. other name for Pushdo
  12. 20. Keeping systems available and in operation
  13. 21. makes an attack possible
  14. 23. the most secure tokens
  15. 25. modify a system to work for the threat agent
  16. 27. cause significant damage to assets or some injury to persons, but no critical injury
  17. 29. financial and accounting standards for public companies
  18. 30. A compromised systems on a network, all controlled by a single attacker
  19. 34. protected by a boundary
  20. 38. spread through internet via windows vulnerabilities
  21. 42. a law based on religious systems, and/or documents
  22. 43. The most common tokens
  23. 45. an attack that is likely to happen, and thus is worth protecting against
  24. 46. infects if attachment is run
  25. 50. A law based on legislative enactments