Security in computing

1234567891011121314151617181920212223242526
Across
  1. 4. a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port
  2. 5. the fault detection – waiting for a system to fail
  3. 8. The science of deducing the plaintext from a ciphertext, without knowledge of the key
  4. 10. The process of writing the malicious code for a particular machine or a particular application is called ---- malicious code
  5. 12. protocol analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network
  6. 14. malicious code detected based on the behavior
  7. 18. a virus that attaches itself to a file and replicates when the infected program is executed
  8. 21. A computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating
  9. 23. The process of anticipating the faults and handling them to minimize disruption and maximize the safety
  10. 24. These are the programs that leak the information
  11. 26. the fault detection – construct a system that reacts to a failure
Down
  1. 1. A cryptosystem is a system for encrypting and decrypting data
  2. 2. is an unforgeable token that gives the possessor certain rights to an object
  3. 3. – keeps a copy of everything pressed
  4. 6. The assurance that the communicating entity is the one that it claims to be
  5. 7. (secure shell) is a pair of protocols defined for Unix
  6. 9. systems reveal information that could facilitate an attack
  7. 11. in this Attack- Malicious program exists between two programs
  8. 13. each program operates as if other routines in the system were malicious or incorrect
  9. 15. door is an undocumented entry point to a module which has occurred because of the developer
  10. 16. Provides protection against denial by one of the entities involved in a communication
  11. 17. defines a single choke point that keeps unauthorized users out of the protected network
  12. 19. this is a cipher which encrypts a digital data stream one bit or one byte at a time
  13. 20. The virus that gets lodged in main memory as part of a resident system program and the virus may infect every program that executes
  14. 22. The study of cryptography and cryptanalysis
  15. 25. This attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination