Magyani, Patrick Joseph Felix 3IT-C ICS133

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 2. detect burst of errors
  2. 3. used by modern Unix systems to indicate access rights
  3. 5. creates botnet focused on financial fraud
  4. 6. a complaint of a person is charged with breaking specific laws
  5. 10. hierarchy of folders or directories
  6. 13. make decisions based on similarities
  7. 17. may take place at transition
  8. 18. a complaint of party files lawsuit against another
  9. 23. keep systems available and in operation
  10. 24. devices that connect to keyboard’s usb cable
  11. 25. detects attack without necessarily blocking it
  12. 27. contain text interpreted by programming language interpreter
  13. 29. spreads through email
  14. 30. used by banking industry to protect electronic funds transfers
  15. 32. first major Internet worm
  16. 34. handles external devices
  17. 37. override global file sharing policy
  18. 39. less provoking
  19. 41. used by Payment Card Industry to protect credit card transactions
  20. 42. standards for protecting personal financial info
  21. 43. system which defenses are weakened
  22. 44. separate situation
  23. 46. rights are inherited from enclosing folders
  24. 48. numbers and other coded data
  25. 49. causes transitions
Down
  1. 1. bogus message given to computers
  2. 4. spreads through Internet via Windows vulnerabilities
  3. 7. protecting info from improper changes
  4. 8. 2 parties rely on 3rd party (mediator) to help negotiate settlement
  5. 9. list of instructions
  6. 11. modify system to work for threat agent
  7. 12. procedures that eavesdrop on keyboard input buffers
  8. 14. financial and accounting standards for public companies
  9. 15. makes an attack possible
  10. 16. single arithmetic operation or comparison
  11. 19. confidentiality attack
  12. 20. system works on behalf of wrong user
  13. 21. represented by arrows
  14. 22. unchanging credential
  15. 26. designed to infect each computer once
  16. 28. attacks control logic in industrial plants
  17. 31. running programs
  18. 33. recovery from compromise
  19. 35. selects the right file in the final directory in the path
  20. 36. 512 bytes each
  21. 38. simple, standard way for programs to use I/O devices & files
  22. 40. security standards for certain types of personal health data
  23. 41. botnet and spam package used to produce 7 million msgs in a day
  24. 45. detect larger-scale errors
  25. 47. generates different credential for each login