NTA Lesson 6 Vocab

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 2. A protocol that encapsulates data packets into another packet.
  2. 3. A program specifically written to break into a password-protected system. It has a relatively large list of common password names that it repeatedly uses to gain access.
  3. 7. A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
  4. 9. A server that mediates traffic between a protected network and the Internet. Translates IP addresses and filters traffic.
  5. 12. Willful harm inflicted on others through the use of information and communication technologies.
  6. 15. An unauthorized user who penetrates a host or network to access and manipulate data.
  7. 17. A backup technique that saves every change made to computer data; it allows data restore at any point in time.
  8. 19. A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. It must be signed by a certificate authority (CA) to be valid.
  9. 21. A self-replicating program or algorithm that consumes system resources.
  10. 23. To pursue stealthily, harass and/or prey upon another person using online venues such as chat rooms, email, social networking sites, etc. The stalker may also meet the victim in an online venue and may gain his or her trust before perpetrating harassment activities.
  11. 25. A network that connects enterprise intranets to the global Internet. Designed to provide access to selected external users.
  12. 29. A software application you can use to store and manage multiple passwords.
  13. 31. A legitimate practice in which a user account is automatically disabled after a certain number of failed authentication attempts.
  14. 32. An attack in which packets are obtained from the network or a network host, then reused.
  15. 34. A scam or other deceptive practice committed via the Internet, usually for the purpose of monetary gain or identity theft.
  16. 35. The length of time a system can be offline before the business is affected.
Down
  1. 1. A single piece of hardware that runs multiple operating systems, such as a server that uses virtualization software to run Windows and Linux OS concurrently.
  2. 4. An application that installs hidden services on systems. Illicit servers consist of "client" code and "server" code that enable the attacker to monitor and control the operation of the computer infected with the server code.
  3. 5. The practice of hiding internal IP addresses from the external network.
  4. 6. The growing movement of employees who bring their own devices, such as smartphones and tablets, to work.
  5. 8. A protocol that allows users and corporations to securely extend their networks over the Internet using remote access servers. Used to create VPNs.
  6. 9. An algorithm that receives input from a random or pseudo-random number generator and automatically generates a password.
  7. 10. In an anti-virus program, a collection of viruses, worms, and illicit applications that are listed as security threats.
  8. 11. The process of managing a BYOD network using various tools.
  9. 13. A plan implemented to manage employee personal mobile devices on a company network.
  10. 14. Fraud committed in your name by someone else who has illicitly gained access to your personal information.
  11. 16. The use of protocol analyzer software to obtain sensitive information, such as user names and passwords.
  12. 18. A credit card that replaces the magnetic strip with an embedded chip for storing or processing data.
  13. 20. An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
  14. 22. A firewall component that inspects all packets addressed to a user-level application; uses proxies to control and filter traffic on a connection-by-connection basis. It also provides authentication.
  15. 24. The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
  16. 26. The standard used by certificate authorities (CAs) for creating digital certificates.
  17. 27. A method of intercepting the transmission of a password during the authentication process. A sniffer is a program used to intercept passwords.
  18. 28. Abbreviation for malicious software. Malware is software designed to harm computer systems.
  19. 30. An authentication and encryption standard that provides security over the Internet. It functions at Layer 3 of the OSI/RM and can secure all packets transmitted over the network.
  20. 33. A proprietary key-management scheme between unknown principals who want to communicate securely. Uses symmetric algorithms and acts as a trusted third party that knows the identities of the organizations asking to communicate, but does not reveal them.