Seminar 2 Crossword

1234567891011121314151617181920
Across
  1. 2. Confidentiality; Integrity; Availability
  2. 6. The breaking into of telephone systems
  3. 7. The appropiate word for intruding into a system without permission
  4. 9. A person, usually an employee, that deliberately breaks into a system to assess security deficiencies
  5. 11. Used to describe any areas of a system that is open to a possible attack
  6. 13. The process of reviewing firewall logs, records, and procedures
  7. 14. A text file on a computer that a browser creates and stores on the hard drive
  8. 16. Seeks to compromise a DNS server so that users are redirected to malicious websites
  9. 18. Generic term for software that has a malicious purpose
  10. 19. Slang term used in movies and in the news to describe any person who breaks into a computer system
  11. 20. Software that literally spies on what you do on a computer
Down
  1. 1. A barrier between a network and the outside world
  2. 3. The most basic security activity that determines if credentials are authorized for access
  3. 4. A technique for breaching a systems's security by exploiting human nature rather than technology
  4. 5. Locating wireless networks to gain access to a system
  5. 8. This type of detection system works to detect attempts to circumvent security measures
  6. 10. A security approach in which not only is the perimeter secured, but also individual systems within the network are secured
  7. 12. Appears to be benign software but secretly downloads a virus to the computer from within
  8. 15. Designed to prevent legitimate access to a system
  9. 17. A device that hides the internal network's IP addresses and presents a single IP address (it's own) to the outside world