IT Security

1234567891011121314151617181920212223
Across
  1. 3. An Internet _____ is a number designating a specific protocol or command
  2. 4. _____ code execution provides for a hacker to make changes to a device wherever they are
  3. 6. IP Address is a _______ label assigned to each device on a network
  4. 7. Service _____ identifier
  5. 9. _____ code, the exploitation of a computer bug by processing invalid data
  6. 10. A _____ of concept allows for experimenting
  7. 14. Common vulnerability _____ system
  8. 16. Identifies, monitors, and analyzes security events.
  9. 17. Encryption is converting _____ to an unrecognizable form
  10. 19. A _____ authority digital certificates
  11. 20. Network: A group of ____ or more computers or devices which are linked together
  12. 21. An _____ attack is immediately recognizable
  13. 22. Pre-booting is the time between turning on a computer and _____ the operating system
  14. 23. A port _____ is an application designed to probe a server or host for open ports
Down
  1. 1. _____ escalation is to gain unauthorized elevated access to information technology
  2. 2. Acts as a filter between a trusted system and an outside connection
  3. 5. A technology or network weakness
  4. 8. To take advantage of an IT weakness
  5. 11. A standard set of rules that allow electronic devices to communicate with each other
  6. 12. A _____ audit is a review of an organization's adherence to regulatory guidelines
  7. 13. Health information privacy (US)
  8. 14. A _____ healing device can recover on its own
  9. 15. European data privacy act
  10. 17. Defense in _____, multiple layers to security
  11. 18. Moving _____ is to exploit from a vulnerable device to other areas of a network