ICS133

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 3. will exploit minor vulnerabilities
  2. 11. runs the browser in a restricted environment that limits its access to host files and other resources
  3. 13. a running program
  4. 16. we call a device a _____ wheb it serves as a stand-in for a different internet host
  5. 18. keeping information secret
  6. 19. _______ section that contain instructions to execute
  7. 20. two parties rely on a thirds party to help negotiate a settlement
  8. 21. keeping systems available and in operation
  9. 23. a compromised systems on a network, all controlled by a single attacker
  10. 24. system works on behalf of the wrong user
  11. 26. when the network does not take steps to ensure reliable delivery, we call the packets _____
  12. 28. security standards for federal computer system
  13. 29. apply the access rights based on the enclosing directories
  14. 31. does not directly improve system performance or security
  15. 33. the process of key changing
  16. 34. group of instructions
  17. 36. security standards for certain types of personal health data
  18. 37. a systematic process that reduces the volume of data by tracking advantage of redundancy in the plaintext
  19. 40. name: identifies the directory entries to follow to find the file
  20. 42. transforms readable data into unreadable data using secret information
  21. 44. modify a system to work for the threat agent
  22. 45. spread through internet via windows vulnerabilities
  23. 46. the combined set of subnets
  24. 48. protecting information from improper changes
  25. 49. applies effort, but avoids social stigma
  26. 50. a component that connects the host to other hosts or to the networks
Down
  1. 1. creates botnet focused on financial fraud
  2. 2. law based on judicial decisions
  3. 4. are useless if no one listens
  4. 5. makes an attack possible
  5. 6. contains text interpreted by a programming language interpreter
  6. 7. the term coined by Ted Nelson, who wanted to improve the computing experience
  7. 8. attack that is likely to happen and worth protecting against
  8. 9. protects the assets
  9. 10. recovery from a compromise
  10. 12. a router is traditionally called a _____
  11. 14. a botnet and spam package that used to produce 7 million messages a day
  12. 15. owned by a user, usually the creator
  13. 17. attacks control logic in industrial plants
  14. 18. mathematical technique to hide or protect data
  15. 19. a decision to trust someone in a particularly delicate or sensitive capacity
  16. 22. single arithmetic operations
  17. 25. creates a botnet that spreads spam and more malware
  18. 27. mathematical term for a step-by-step procedure
  19. 30. bogus messages given to computers
  20. 32. the numbered ports that can connect to a computer
  21. 35. when we share a key with two or more people, we refer to that group as being the
  22. 36. a computer connected to the network
  23. 38. protects a set of files from access by others
  24. 39. apply the same access rights to all new files
  25. 41. malicious software
  26. 43. data on a hard drive are organized into these independent blocks called _____
  27. 47. law based on legislative enactments