ICS 133
Across
- 4. spreads through email, creates a botnet that spreads spam and more malware
- 6. will cause significant disruptions and/or critical injuries to people to achieve objectives
- 12. two parties rely on a third party, the mediator, to help negotiate a settlement
- 14. applies effort, but minor vulnerabilities
- 15. reputable sources for the information
- 17. other name of Conficker
- 18. a law based on judicial decisions
- 19. attacks control logic in industrial plants
- 22. security standards for federal computer systems
- 24. encrypt data readable only by the recipient
- 26. disruption of transmissions
- 28. An attack system that is unsafe to use
- 31. establish a protected area around sensitive devices and block attackers from area
- 32. uses the DNS to look up a name
- 33. causes harm and limited damage to assets
- 35. Developed by IBM and US government
- 36. creates a botnet focused on financial fraud
- 37. data from one machine masks others
- 39. keep information secret
- 40. exploit minor vulnerabilities
- 41. protects information even when it is not under your physical control
- 44. bogus messages given to computers
- 47. Protecting information from improper changes
- 48. A botnet and spam package that used to produce 7 million messages a day
- 49. contain text interpreted by a programming language interpreter
Down
- 1. standards for protecting personal financial information
- 2. protect the assets
- 3. data resides in _____
- 5. _____ agent tries to attack assets
- 7. malicious software
- 8. security standards for certain types of personal health data
- 9. protect traffic from two risks
- 10. put acoustical and electromagnetic shields around the equipment
- 11. adjust the device to use less power and radiate a weaker signal
- 13. attack on confidentiality
- 16. other name for Pushdo
- 20. Keeping systems available and in operation
- 21. makes an attack possible
- 23. the most secure tokens
- 25. modify a system to work for the threat agent
- 27. cause significant damage to assets or some injury to persons, but no critical injury
- 29. financial and accounting standards for public companies
- 30. A compromised systems on a network, all controlled by a single attacker
- 34. protected by a boundary
- 38. spread through internet via windows vulnerabilities
- 42. a law based on religious systems, and/or documents
- 43. The most common tokens
- 45. an attack that is likely to happen, and thus is worth protecting against
- 46. infects if attachment is run
- 50. A law based on legislative enactments