Network Security
Across
- 4. Use of cryptographic systems to provide message-by-message authentication and integrity
- 6. Cyber-attacks by national governments
- 8. The attacks and attackers that companies face
- 9. Layers of defense such that all must be breached for an attacker to succeed
- 11. Method for malware to move to a victim computer
- 14. Tricking the victim into doing something against his or her interests
- 17. Attackers who use scripts or other applications developed by more experienced attackers
- 18. Worm that will automatically infect other computers without any user interaction
- 20. A vulnerability-specific attack that occurs before a patch is available
- 21. Some form of proof of identity
- 22. Attempting to guess a password by using every possible combination of characters
- 25. Mandatory directives that must be followed during implementation
- 27. Entity trying to prove their identity by supplying some form of credentials
- 30. Attempting to guess a password based on dictionary patterns with basic modifications to dictionary words such as capitalization or digit replacement
- 33. Scripts that travel with the downloaded webpage from the webserver to the browser where they are executed locally
- 36. Method of authentication that uses of a private key, pubic key and a trusted verifier
- 38. Broad statements of what should be accomplished, not how to accomplish it
- 39. Attempting to guess a password by trying all the words in a standard or custom dictionary
- 42. Long passwords that contain a mix of lowercase letters, uppercase letters, numeral characters, and symbols
- 44. Lying to get victims to persuade them to do something against their financial self-interest
- 45. Formalized plan to reestablish a firm’s ability to continue functioning after a devastating event
- 46. Full stand-alone malware programs that operates and or replicates by itself
- 47. A flaw in a program that permits a specific attack or set of attacks against a piece of software or hardware
- 49. Instructions that are merely optional guidelines for implementation
- 51. Process of balancing threats and protection costs for individual assets
- 53. A name given to software that collects information about the user and the system without their knowledge and reports this info to another system for tracking
- 54. Attacking your own systems to discover their weaknesses
- 56. Collecting enough data about a victim to impersonate the victim and assume their identity for financial transactions
- 57. Intentionally using a computer resource without authorization or in excess of authorization
Down
- 1. The actions that a person given access to a resources is allowed to take
- 2. A pair of algorithms used to encrypt and decrypt secure communications
- 3. Methods and processes to ensure policies have been implemented properly
- 5. deep inspection of application messages across multiple packets to identify malicious activity
- 7. Procedures to capture and safeguard data as evidence for criminal court proceedings
- 9. Formalized plan to reestablish IT operations within a firm
- 10. Hardware or software that examines packets and determines if they are allowed to pass or not
- 12. Use of authentic-looking e-mail or websites to entice the user to send his or her personal and/or confidential information
- 13. Cyber attackers by terrorists
- 15. Part of a piece of malware that performs malicious actions
- 16. The practice and study of techniques for securing confidential communications
- 19. Alternate way back into a system
- 23. Process or program that takes advantage of a known vulnerability
- 24. Successful attacks
- 26. Filtering messages that are arriving at a company’s firewall from an outside source destined for hosts inside the trusted company network
- 28. Pieces of executable code that attach themselves to other programs
- 29. A malicious program that disguises itself as a legitimate system file
- 31. Username and password combination that are relatively static in nature and are used each time authentication occurs; most common authentication method
- 32. Use of two authentication methods such as something you know, something you have, or something you are
- 34. Closing off all avenues of attack
- 35. DoS attack committed by a distributed number or simultaneous attackers
- 37. Filtering messages that arrive at a company’s firewall from inside the trusted network destined for hosts on the outside
- 40. Limiting who may have access to each resource and limiting permissions to what they are able to do with the resource
- 41. Use of measurements of a person’s attributes for authentication purposes
- 43. General term for any evil software that does harm to your system
- 48. Trusted system or entity that will verify a supplicant’s identity
- 50. Making a computer or entire network unavailable to legitimate users by various means
- 52. Sample actions taken for policy oversight
- 55. General purpose exploitation programs that can be remotely controlled after installation