Across
- 1. Restrict on sending or receiving address
- 5. creates botnet focused on financial fraud
- 6. attacks control logic in industrial plants; probable target was Iranian nuclear sites
- 7. hyper text markup language
- 14. a coil of wire and a magnetic surface
- 15. divide the information into separate sets
- 16. certificate is distributed widely
- 19. Unreliable tricks to replace an existing key
- 21. availability again
- 24. an availability attack
- 25. alternative to User Groups
- 26. emails that warn of a computer security risk and recommend forwarding to everyone – not how we distribute such warnings
- 29. Restrict according to whether the traffic was initiated inside or outside of the site
- 30. uses the DNS to look up a name
- 31. redirects visitors to a site masquerading as the real site
- 32. system works on behalf of the wrong user
- 35. womething you know
- 36. lets a client program retrieve email from a server
- 37. Tokens the most secure
- 40. modify a system to work for the threat agent
- 41. are protected by a boundary
- 42. will cause significant disruptions and/or critical injuries to people to achieve objectives
- 45. law based on judicial decisions
- 47. protects information even when it is not under your physical control
- 49. for highly efficient transmission without retransmission
- 50. DOS attack that transmits numerous “ping” packets
Down
- 2. Examine application-level data to detectviolations of specific restrictions
- 3. users are not all cleared for all data
- 4. openings in the boundary
- 8. Could steal computer assets or storage
- 9. Sections Contain instructions to execute and Contain unchanging data
- 10. eavesdropping or sniffing
- 11. authentication may work
- 12. Restrict on TCP or UDP port number
- 13. a simple and popular protocol
- 17. developed by IBM and US government
- 18. transmits an email toanother server for delivery to its destination
- 20. overrides a global file sharing policy
- 22. was unveiled in 2002 128-bit, 192-bit, and 256-bit keys
- 23. can’t be modified
- 27. structured query language
- 28. selects the right file in the final directory in the path
- 29. Sections Contain variables that change and also Contain “free form” RAM
- 32. first major Internet worm
- 33. Found by astronomy grad student Clifford Stoll
- 34. one party acts against another based on a shared relationship. For example, an employer disciplines or fires an employee
- 36. two parties rely on a third party, the mediator, to help negotiate a settlement.
- 38. Something you have
- 39. Introduced with early Wi-Fi products
- 43. an attacked system
- 44. automated host configuration
- 46. create, read, update, delete
- 48. is a group of instructions
