Module 6 Puzzle
Across
- 4. Do this to all unneeded programs/software
- 8. Hackers who hack only for legal/ethical purposes
- 11. This should be done to large networks to break them up into more manageable networks.
- 12. The six Ps of security are: ports, patch, _____, probe, policies, & physical
- 14. The process to look for vulnerabilites on a network
- 16. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- 17. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- 18. Using interpersonal skills to extract information about a computer system and its security
- 19. preferred location for storing backups
- 20. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
- 1. one of the most prestigious certifications for networking professionals
- 2. A numerical designation for a connection point on a computer
- 3. Someone who attempts to compromise a system to assess its vulnerability
- 5. A reference to how long a user has used a password
- 6. Searching through trash looking for information that might be useful in hacking or identity theft
- 7. checking a target machine to see what ports are open
- 9. The minimum frequency for system probing and audits
- 10. A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
- 13. Perform system patches, probe for flaws, check logs, and review policies
- 15. The most basic rule of computer security is to install these as soon as they are available