Security
Across
- 3. These devices are common in homes, often have weak security, and have been exploited to launch DDOS attakcs.
- 4. This type of program always executes with the permissions of the owner.
- 5. command to write to syslog from terminal
- 9. This type of system authentication involves providing more than just a password
- 10. Technique to harden a system that involves implementing multiple types of security
- 14. Type of cryptography that involves both public and private keys.
- 17. Occurs when the sequence of instructions matters but is not enforced
- 19. Type of attack involves posing as a trusted figure to induce individuals to reveal personal information.
- 21. This file is used to exchange data more quickly between the hard drive and RAM.
- 22. Always have more than one of these to recover your system
- 23. If an attacker gains access to this account, they can do anything on the system.
Down
- 1. Security exercise to determine vulnerabilities in a system
- 2. often relies on an access control list to determine what traffic can enter and exit a network.
- 6. Linux software that loads kernel
- 7. Data structure that defines the starting block and length of a file.
- 8. Command to display real-time resource usage
- 11. Hash used in current linux distros for shadow file account passwords
- 12. failing to use this command in a parent process may create a zombie
- 13. A password used with this software can prevent a thief from booting your device.
- 15. Release of energy that can fry solid-state electronics.
- 16. A secure way to access a system remotely
- 18. A process does not want to have this value be high, or else many other processes might run before it
- 20. This type of threat is often the most dangerous and unexpected.
- 22. This vulnerability can occur when data is written beyond the bounds of an array.