ITSY 2400 Chapter 12

123456789101112131415161718
Across
  1. 3. a bot
  2. 6. can be caused by malformed application input
  3. 8. uniform resource locator
  4. 10. used to encrypt databases
  5. 13. applocker rule that checks location of executable file
  6. 14. integrated collection of business software
  7. 15. applocker predecessor
  8. 16. an example of this is using an SQl statement as part of login credentials
  9. 17. uses port 21 and possibly port 20
  10. 18. masquerading as another user
Down
  1. 1. servers here are assessible from Internet
  2. 2. a type of operating system encryption
  3. 4. used to access data in a database
  4. 5. adding more authoity to current process than the process should possess
  5. 7. applocker rule that checks digital certficates
  6. 9. applocker rule that checks cryptographic hash of executable file
  7. 11. can restrict program execution using group policy
  8. 12. part of a certificate