Chapter 9: Fundamental Security

12345678910111213141516171819202122232425
Across
  1. 2. Uses network sniffers to extract usernames and passwords to be used at a later date to gain access.
  2. 3. Is a person who is able to gain access to equipment or a network by tricking people.
  3. 6. Prevents unauthorized access to the local computer and the network.
  4. 9. Users outside of an organization that do not have authorized access to the network or resources.
  5. 12. Gains access to resources on devices by pretending to be a trusted computer.
  6. 14. Changes the DNS records on a system to point to false servers where the data is recorded.
  7. 15. Sends abnormally large amounts of requests to a system preventing access to the services.
  8. 16. Is the protocol suite that is used to control all of the communications on the Internet.
  9. 19. Accidental threats are when the user damages data or equipment unintentionally.
  10. 22. Also known as junk mail
  11. 23. Programming language developed to interact with HTML source code to allow interactive websites.
  12. 24. Created by Microsoft to control interactivity on webpages.
Down
  1. 1. Events or attacks that steal, damage, or destroy equipment.
  2. 4. A large quantity of bulk e-mail that overwhelms the e-mail server preventing users from accessing it.
  3. 5. A software program that displays advertising on your computer.
  4. 7. A file or program other then a virus that can be harmful.
  5. 8. Events or attacks that remove, corrupt, deny access, allow access or steal information.
  6. 10. Distributed without any user knowledge.
  7. 11. Uses "zombies" to make tracing the origin of the DoS attack difficult to locate.
  8. 13. A series of repeated, larger than normal pings that crash the receiving computer.
  9. 17. Intercepts or inserts false information in traffic between two hosts.
  10. 18. Programming language that allows applets to run within a web browser.
  11. 20. Randomly opens TCP ports.
  12. 21. Fundamental Security.
  13. 25. A program that is written with malicious intent and sent out by attackers.