133

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 1. Level of Motivation that can cause significant damage to assets or some injury to persons, but not critical injury
  2. 3. Level of Motivation will expoit minor vulnerabilities
  3. 5. C in CRUD
  4. 7. a type of law wherein based on legislative enactments
  5. 8. U in CRUD
  6. 10. Email that tries to retrieve authentication data
  7. 13. Sarbaines-Oxley financial and accounting standards for public companies
  8. 14. spreads through email & creates a botnet that spreads spam and more malware
  9. 16. User ______ Protocol (UDP)
  10. 19. a type of law wherein based on judicial decisions
  11. 22. a type of law wherein based on religious systems And or documents.
  12. 23. protects information even when it is not under your physical control
  13. 27. type of Cipher Named after a 16th century author
  14. 28. interactive DNS resolver
  15. 29. a simple and popular protocol
  16. 31. malicious software
  17. 32. Risk Management ________
  18. 35. attacks control logic in industrial plants, probable target was Iranian nuclear sites
  19. 36. _______ Control Message Protocol (ICMP)
  20. 37. type of attack that bogus messages given to computers
  21. 40. type of attack that modify a system to work for the threat agent
  22. 43. D in CRUD
  23. 44. creates botnet focused on financial fraud
  24. 45. Secure ________ Layer (SSL)
  25. 46. type of token that Stores a secret that generates a different credential for each login
Down
  1. 1. Dynamic _________ Control Protocol (DHCP)
  2. 2. ____________ poisoning resolver receives a bogus response to a DNS request
  3. 4. type of Cipher Replace each letter in a text by the 3rd letter following it in the alphabet:
  4. 6. ________-Hellman (D-H),Constructs a shared secret from information shared in public
  5. 8. __________ Resource Locator
  6. 9. The ________ procedure in the operating system (OS) switches running processes
  7. 11. Unsolicited email; often distributes frauds
  8. 12. R in CRUD
  9. 15. first A in ARPANET
  10. 17. ________ contain text interpreted by a programming language interpreter
  11. 18. authentication for DNS responses
  12. 20. a key’s “safe” lifetime
  13. 21. ________ Worm first major Internet worm
  14. 24. (ACK)
  15. 25. set of people or devices that all share the same secret key
  16. 26. two parties rely on a third party, the mediator, to help negotiate a settlement.
  17. 30. ________ Attack, DOS attack that sends a forged “ping” using a broadcast address to amplify the number of replies produced
  18. 33. Transmission _______ Protocol (TCP)
  19. 34. type of complaint wherein a person is charged with breaking specific laws.
  20. 38. _________ Address Translation (NAT)
  21. 39. types of access control strategy Cryptography Kerckhoff,Shannon
  22. 41. ________ Private Networks (VPNs)
  23. 42. type of Tokens that Stores an unchanging credential.
  24. 47. a more elaborate protocol