Magyani, Patrick Joseph Felix 3IT-C ICS133
Across
- 2. detect burst of errors
- 3. used by modern Unix systems to indicate access rights
- 5. creates botnet focused on financial fraud
- 6. a complaint of a person is charged with breaking specific laws
- 10. hierarchy of folders or directories
- 13. make decisions based on similarities
- 17. may take place at transition
- 18. a complaint of party files lawsuit against another
- 23. keep systems available and in operation
- 24. devices that connect to keyboard’s usb cable
- 25. detects attack without necessarily blocking it
- 27. contain text interpreted by programming language interpreter
- 29. spreads through email
- 30. used by banking industry to protect electronic funds transfers
- 32. first major Internet worm
- 34. handles external devices
- 37. override global file sharing policy
- 39. less provoking
- 41. used by Payment Card Industry to protect credit card transactions
- 42. standards for protecting personal financial info
- 43. system which defenses are weakened
- 44. separate situation
- 46. rights are inherited from enclosing folders
- 48. numbers and other coded data
- 49. causes transitions
Down
- 1. bogus message given to computers
- 4. spreads through Internet via Windows vulnerabilities
- 7. protecting info from improper changes
- 8. 2 parties rely on 3rd party (mediator) to help negotiate settlement
- 9. list of instructions
- 11. modify system to work for threat agent
- 12. procedures that eavesdrop on keyboard input buffers
- 14. financial and accounting standards for public companies
- 15. makes an attack possible
- 16. single arithmetic operation or comparison
- 19. confidentiality attack
- 20. system works on behalf of wrong user
- 21. represented by arrows
- 22. unchanging credential
- 26. designed to infect each computer once
- 28. attacks control logic in industrial plants
- 31. running programs
- 33. recovery from compromise
- 35. selects the right file in the final directory in the path
- 36. 512 bytes each
- 38. simple, standard way for programs to use I/O devices & files
- 40. security standards for certain types of personal health data
- 41. botnet and spam package used to produce 7 million msgs in a day
- 45. detect larger-scale errors
- 47. generates different credential for each login