Across
- 3. This ICMP Flood attack is based on sending the victim an overwhelming number of ping packets.
- 6. This ICMP Flood is attack is based on sending the victim a malformed ping packet, which may lead to a system crash.
- 7. A weakness in an information system, cryptographic system, or components that could be exploited.
- 11. A system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.
- 14. Forging of the IP sender address so that the location of the attacking machine cannot easily be identified.
- 15. This port scanner attempts to connect to all 65,535 ports.
- 16. This attack involves sending mangled IP fragments with overlapping, over-sized payloads to the target machine.
- 17. This occurs when a host sends a flood to TCP/SYN packets, often with a forged sender address.
Down
- 1. Information Assurance controls are based on the classification and ____ of the system in use.
- 2. The act of systematically scanning a computer’s ports.
- 4. Efforts to temporarily or indefinitely interrupt r suspend services of a host connected to the Internet.
- 5. The process of monitoring the network and computer system events for signs of incidents which are violations or imminent threats or a violation of computer security policies.
- 8. An attack that sends legitimate application layer requests but reads responses very slowly, thus trying to exhaust the serve’s connection pool.
- 9. A segment of an internal network that is defined by common security policies.
- 10. Provides the capability to control the number of application sessions while preserving access to the base network.
- 12. This ICMP Flood attack relies on misconfigured network devices that allow packets to be sent to all computer hosts on a network via the broadcast address.
- 13. A physical or logical subnetwork that contains and exposes an organization’s eternal facing services to a larger and untrusted network usually the internet.
