4a

1234567891011121314151617
Across
  1. 3. This ICMP Flood attack is based on sending the victim an overwhelming number of ping packets.
  2. 6. This ICMP Flood is attack is based on sending the victim a malformed ping packet, which may lead to a system crash.
  3. 7. A weakness in an information system, cryptographic system, or components that could be exploited.
  4. 11. A system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.
  5. 14. Forging of the IP sender address so that the location of the attacking machine cannot easily be identified.
  6. 15. This port scanner attempts to connect to all 65,535 ports.
  7. 16. This attack involves sending mangled IP fragments with overlapping, over-sized payloads to the target machine.
  8. 17. This occurs when a host sends a flood to TCP/SYN packets, often with a forged sender address.
Down
  1. 1. Information Assurance controls are based on the classification and ____ of the system in use.
  2. 2. The act of systematically scanning a computer’s ports.
  3. 4. Efforts to temporarily or indefinitely interrupt r suspend services of a host connected to the Internet.
  4. 5. The process of monitoring the network and computer system events for signs of incidents which are violations or imminent threats or a violation of computer security policies.
  5. 8. An attack that sends legitimate application layer requests but reads responses very slowly, thus trying to exhaust the serve’s connection pool.
  6. 9. A segment of an internal network that is defined by common security policies.
  7. 10. Provides the capability to control the number of application sessions while preserving access to the base network.
  8. 12. This ICMP Flood attack relies on misconfigured network devices that allow packets to be sent to all computer hosts on a network via the broadcast address.
  9. 13. A physical or logical subnetwork that contains and exposes an organization’s eternal facing services to a larger and untrusted network usually the internet.