IT Security
Across
- 3. An Internet _____ is a number designating a specific protocol or command
- 4. _____ code execution provides for a hacker to make changes to a device wherever they are
- 6. IP Address is a _______ label assigned to each device on a network
- 7. Service _____ identifier
- 9. _____ code, the exploitation of a computer bug by processing invalid data
- 10. A _____ of concept allows for experimenting
- 14. Common vulnerability _____ system
- 16. Identifies, monitors, and analyzes security events.
- 17. Encryption is converting _____ to an unrecognizable form
- 19. A _____ authority digital certificates
- 20. Network: A group of ____ or more computers or devices which are linked together
- 21. An _____ attack is immediately recognizable
- 22. Pre-booting is the time between turning on a computer and _____ the operating system
- 23. A port _____ is an application designed to probe a server or host for open ports
Down
- 1. _____ escalation is to gain unauthorized elevated access to information technology
- 2. Acts as a filter between a trusted system and an outside connection
- 5. A technology or network weakness
- 8. To take advantage of an IT weakness
- 11. A standard set of rules that allow electronic devices to communicate with each other
- 12. A _____ audit is a review of an organization's adherence to regulatory guidelines
- 13. Health information privacy (US)
- 14. A _____ healing device can recover on its own
- 15. European data privacy act
- 17. Defense in _____, multiple layers to security
- 18. Moving _____ is to exploit from a vulnerable device to other areas of a network