Network Security Fundamentals

1234567891011121314151617181920212223242526272829
Across
  1. 3. This type of vulnerability might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
  2. 6. A type of access attack that is implemented using brute force, trojan horse, and packet sniffers.
  3. 8. This physical threat includes physical damage to servers, routers, switches, cabling plant, and workstations
  4. 12. A type of network attack that is defined by the unauthorized manipulation of data, system access, or user privileges.
  5. 14. Similar to a virus in that it replicates functional copies of itself, but it is standalone software and does not require a host program or human help to propagate.
  6. 15. The degree of weakness in a network or a device.
  7. 17. An infected host.
  8. 22. Short for "malicious software".
  9. 23. A network of zombies.
  10. 25. A harmful piece of software that looks legitimate. They self-replicate and must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
  11. 26. Similar to a DoS attack, but it originates from multiple, coordinated sources.
  12. 27. A type of access attack where a threat actor uses a compromised system as a base for attacks against other targets.
  13. 28. This type of vulnerability might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistence disaster recovery plan.
  14. 29. This physical threat includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Down
  1. 1. This physical threat includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
  2. 2. A type of network attack that is defined by the discovery and mapping of systems, services, or vulnerabilities.
  3. 4. A type of malware that propagates by inserting a copu of itself into, and becoming part of, another program. It spread from one computer to the other.
  4. 5. Prevents or allows access by specific application types based on port numbers.
  5. 7. A type of access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
  6. 9. This type of vulnerability might include unsecured user accounts, system accounts, with easily guessed password, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
  7. 10. Prevents or allows access based on IP or MAC addresses.
  8. 11. An internet tool used to easily determine the IP address space assigned to a given corportation or entity.
  9. 13. Has the capability to recognize and filter out specific types of attacks, such as a denial of service (DoS).
  10. 16. This physical threat includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
  11. 18. Also called a host. It is an individual computer system or devices that acts as a network client.
  12. 19. A type of access attack where a threat actor uses aunauthorized privileges to gain access to a system, possibily compromisng the target.
  13. 20. A type of network attach that is defined by the disabling or corruption of networks, systems, or services.
  14. 21. Resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access.
  15. 24. Prevents or allows access to websites based on specific URLs or keywords.
  16. 26. Enables a network administrator to apply specific policies for hosts connected to that network.