ITSY 2400 Chapter 12
Across
- 3. a bot
- 6. can be caused by malformed application input
- 8. uniform resource locator
- 10. used to encrypt databases
- 13. applocker rule that checks location of executable file
- 14. integrated collection of business software
- 15. applocker predecessor
- 16. an example of this is using an SQl statement as part of login credentials
- 17. uses port 21 and possibly port 20
- 18. masquerading as another user
Down
- 1. servers here are assessible from Internet
- 2. a type of operating system encryption
- 4. used to access data in a database
- 5. adding more authoity to current process than the process should possess
- 7. applocker rule that checks digital certficates
- 9. applocker rule that checks cryptographic hash of executable file
- 11. can restrict program execution using group policy
- 12. part of a certificate