Seminar 2 Crossword
Across
- 2. Confidentiality; Integrity; Availability
- 6. The breaking into of telephone systems
- 7. The appropiate word for intruding into a system without permission
- 9. A person, usually an employee, that deliberately breaks into a system to assess security deficiencies
- 11. Used to describe any areas of a system that is open to a possible attack
- 13. The process of reviewing firewall logs, records, and procedures
- 14. A text file on a computer that a browser creates and stores on the hard drive
- 16. Seeks to compromise a DNS server so that users are redirected to malicious websites
- 18. Generic term for software that has a malicious purpose
- 19. Slang term used in movies and in the news to describe any person who breaks into a computer system
- 20. Software that literally spies on what you do on a computer
Down
- 1. A barrier between a network and the outside world
- 3. The most basic security activity that determines if credentials are authorized for access
- 4. A technique for breaching a systems's security by exploiting human nature rather than technology
- 5. Locating wireless networks to gain access to a system
- 8. This type of detection system works to detect attempts to circumvent security measures
- 10. A security approach in which not only is the perimeter secured, but also individual systems within the network are secured
- 12. Appears to be benign software but secretly downloads a virus to the computer from within
- 15. Designed to prevent legitimate access to a system
- 17. A device that hides the internal network's IP addresses and presents a single IP address (it's own) to the outside world