133 Crossword

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 3. are protected by a boundary
  2. 5. for reliable, sequential data transmission
  3. 6. certificate is distributed widely
  4. 7. law based on judicial decisions
  5. 11. two parties rely on a third party, the mediator, to help negotiate a settlement.
  6. 12. hyper text markup language
  7. 13. Introduced with early Wi-Fi products
  8. 14. first major Internet worm
  9. 17. authentication may work
  10. 21. will cause significant disruptions and/or critical injuries to people to achieve objectives
  11. 23. DOS attack that transmits numerous “ping” packets
  12. 24. an attacked system
  13. 25. used to establish state
  14. 26. fails to detect a match between a credential and the database
  15. 28. contain text interpreted by a programming language interpreter
  16. 30. openings in the boundary
  17. 33. automated host configuration
  18. 35. Something you have
  19. 36. creates botnet focused on financial fraud
  20. 37. authentication is effective
  21. 39. womething you know
  22. 41. protects information even when it is not under your physical control
  23. 42. java server pages
  24. 44. selects the right file in the final directory in the path
  25. 45. law based on legislative enactments
  26. 46. uses the DNS to look up a name
Down
  1. 1. confidential personal statements
  2. 2. attacks control logic in industrial plants; probable target was Iranian nuclear sites
  3. 3. Tokens the most secure
  4. 4. will exploit minor vulnerabilities
  5. 8. users are not all cleared for all data
  6. 9. is a group of instructions
  7. 10. divide the information into separate sets
  8. 15. create, read, update, delete
  9. 16. alternative to User Groups
  10. 18. can’t be modified
  11. 19. returns details about domain ownership
  12. 20. stored in a control section and executed by the CPU
  13. 22. eavesdropping or sniffing
  14. 27. applied to all users by default
  15. 29. for highly efficient transmission without retransmission
  16. 31. was unveiled in 2002 128-bit, 192-bit, and 256-bit keys
  17. 32. name translation for other services
  18. 34. overrides a global file sharing policy
  19. 37. Found by astronomy grad student Clifford Stoll
  20. 38. maliciously create or modify data
  21. 40. developed by IBM and US government
  22. 43. structured query language
  23. 47. causes harm and limited damage to assets