Information Security-unit-1

12345678910111213141516171819
Across
  1. 3. first phase of sec sdlc
  2. 4. probability of threat to system
  3. 6. replicating malicious software that spreads throughout system
  4. 11. makes server unavailable by flooding
  5. 13. provides assurance that user has authority to access update or delete
  6. 15. intentional or unintentional attempt to compromise information
  7. 16. using social skills to access credentials
  8. 17. program that monitor data travelling over a network
  9. 18. a pillar of IS
  10. 19. attacker routes large quantities of email to targer
Down
  1. 1. automated process that interacts with other network services
  2. 2. bypasses normal authentication process
  3. 5. only those with sufficient privilege can access
  4. 6. weakness or faults in a system
  5. 7. intruder assumes a trusted ip address
  6. 8. organizational Resources that is being protected
  7. 9. attack which uses trial and error
  8. 10. unsolicited commercial email
  9. 12. proving identity that he or she claims
  10. 14. potential danger to an asset