ICS133: Computer Security Crossword Puzzle

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 4. A Public-Key Cryptography that encrypt data readable only by the recipient and verify that particular sender encrypted a particular message.
  2. 5. It is a running program.
  3. 9. A type of error that fails to detect a match between a credential and the database.
  4. 10. An Industry Security Standards from a family of international standards for security system quality improvement.
  5. 14. A ____________ attack uses a list of likely passwords as the password space.
  6. 17. A stronger secret key building blocks that use wrapping technique to protect keys carried in network messages.
  7. 18. A level of motivation that applies effort, but avoids social stigma.
  8. 21. A stronger secret key building blocks where the center distributes wrapped keys and authorized users to share a secret with it.
  9. 23. A US Government standards for financial and accounting standards for public companies. (Acronym)
  10. 25. It is the amount of lead time required to set up the attack.
  11. 27. A transport layer security that was developed by netscape in 1994 and is a part of commercial client or server Web package. It is the first really successful public-key application.
  12. 28. An Industry Security Standards that uses the banking industry to protect electronic funds transfers.
  13. 30. The most secure type of token that stores a secret that generates a different credential for each login.
  14. 32. An attack on DNS where the resolver receives a bogus response to a DNS request.
  15. 33. A US Government security standards for certain types of personal health data. (Acronym)
  16. 34. The most common type of token that stores an unchanging credential.
  17. 37. A tailored policy where it share some blocked files.
  18. 40. It is a group of instructions.
  19. 41. A type of error that incorrectly detects a match with a credential and the database.
  20. 42. The __________ procedure in the operating system (OS) switches running processes.
  21. 45. "Data in motion", A basic state that is being moved from one place to another.
  22. 46. A Public-Key Cryptography that constructs a shared secret from information shared in public.
  23. 48. A tailored policy where it block some files from sharing.
  24. 49. A US Government standards for protecting personal financial information. (Acronym)
  25. 50. A modern malware where a botnet and spam package that used to produce 7 million messages a day.
Down
  1. 1. A malicious software is called a _______.
  2. 2. It is the number and types of people required for the attack.
  3. 3. It summarizes the attack in the Attack Case Study.
  4. 6. A modern malware that attacks control logic in industrial plants.
  5. 7. A stronger secret key building blocks that generate a new key using a one-way hash.
  6. 8. It is the first major Internet worm in 1988 that disabled about 10% of Internet computers.
  7. 11. A tailored policy where it gives full rights for some users.
  8. 12. A global policy that let users share their files
  9. 13. "Data at rest", A basic state that stores data or information in a computer and is not being processed.
  10. 15. A policy alternative that modify rights for specific sets of files.
  11. 16. _______ ____________ are stored in a control section and executed by the CPU.
  12. 19. It is the brief description of threat agent in the Attack Case Study.
  13. 20. A level of motivation that will exploit minor vulnerabilities.
  14. 22. A policy alternative that applied to all users by default.
  15. 24. A modern malware that creates botnet focused on financial fraud.
  16. 26. A global policy that keep users separate
  17. 29. It uses a PRNG to transform the current key into a new one and separate endpoints that can apply the same PRNG to yield the same key.
  18. 31. A US Government security standards for federal computer systems. (Acronym)
  19. 35. A basic state that is being used by an active process and is usually stored in RAM.
  20. 36. A ____ _______ prevents a sender from sending data transfer than the recipient can handle it.
  21. 38. A modern malware that – spreads through email and creates a botnet that spreads spam and more malware.
  22. 39. acceptance rate The likelihood of incorrectly authenticating someone as an authorized user.
  23. 43. An Industry Security Standards that is used by “Payment Card Industry” to protect credit card transactions.
  24. 44. A modern malware that spreads through the Internet via Windows vulnerabilities and created a botnet used for spam and malware distribution.
  25. 47. _______ contain text interpreted by a programming language interpreter.