Security

1234567891011121314151617181920212223
Across
  1. 3. These devices are common in homes, often have weak security, and have been exploited to launch DDOS attakcs.
  2. 4. This type of program always executes with the permissions of the owner.
  3. 5. command to write to syslog from terminal
  4. 9. This type of system authentication involves providing more than just a password
  5. 10. Technique to harden a system that involves implementing multiple types of security
  6. 14. Type of cryptography that involves both public and private keys.
  7. 17. Occurs when the sequence of instructions matters but is not enforced
  8. 19. Type of attack involves posing as a trusted figure to induce individuals to reveal personal information.
  9. 21. This file is used to exchange data more quickly between the hard drive and RAM.
  10. 22. Always have more than one of these to recover your system
  11. 23. If an attacker gains access to this account, they can do anything on the system.
Down
  1. 1. Security exercise to determine vulnerabilities in a system
  2. 2. often relies on an access control list to determine what traffic can enter and exit a network.
  3. 6. Linux software that loads kernel
  4. 7. Data structure that defines the starting block and length of a file.
  5. 8. Command to display real-time resource usage
  6. 11. Hash used in current linux distros for shadow file account passwords
  7. 12. failing to use this command in a parent process may create a zombie
  8. 13. A password used with this software can prevent a thief from booting your device.
  9. 15. Release of energy that can fry solid-state electronics.
  10. 16. A secure way to access a system remotely
  11. 18. A process does not want to have this value be high, or else many other processes might run before it
  12. 20. This type of threat is often the most dangerous and unexpected.
  13. 22. This vulnerability can occur when data is written beyond the bounds of an array.