Chapter 13 CIS 25

12345678910111213141516171819202122232425262728293031
Across
  1. 1. Network segment for public-facing services
  2. 4. Automatically running programs from media
  3. 8. Grouping objects within Active Directory
  4. 9. Access rights granted to users
  5. 11. Reusing captured data to gain access
  6. 12. Enticing victims to reveal sensitive information
  7. 14. Observing someone’s private information
  8. 16. Vulnerability exploited before being patched
  9. 17. Corrupting DNS data to redirect traffic
  10. 20. Self-replicating malware spreading across networks
  11. 21. Unauthorized entry by following authorized person
  12. 22. Unsolicited, often irrelevant, bulk messages
  13. 23. Pretending to be someone else
  14. 27. Retrieving sensitive information from trash
  15. 29. Malware encrypting files, demanding ransom payment
  16. 30. Full disk encryption for Windows systems
  17. 31. Overloading a system to deny service
Down
  1. 2. Directory service for Windows domain networks
  2. 3. Guidelines for protecting information assets
  3. 5. Faking identity to gain unauthorized access
  4. 6. Double-door system for controlled access
  5. 7. Rules for creating and managing passwords
  6. 10. Malicious software disguised as legitimate
  7. 13. Manipulating people to divulge information
  8. 15. Gathering information about a target system
  9. 18. Targeted phishing aimed at specific individuals
  10. 19. Database of known malware signatures
  11. 24. Overwhelming server with connection requests
  12. 25. Hardware-based security for cryptographic operations
  13. 26. Erasing data from magnetic storage
  14. 28. Software providing unauthorized access to systems