Chapters 1 & 2

1234567891011121314151617181920
Across
  1. 2. this type of attack can compromise the security goal of availability
  2. 5. type of firewall that protects an individual computer
  3. 6. allows a remote attacker to connect to your system via the network
  4. 7. a false alert from an IDS
  5. 12. helps achieve the security goal of confidentiality
  6. 13. an individual computer that is part of a botnet
  7. 14. an intrusion detection system that monitors an individual computer
  8. 15. malware that self-replicates
  9. 17. software used for whole disk encryption
  10. 19. a popular RAT (remote access trojan)
Down
  1. 1. an intrusion detection system that monitors network traffic
  2. 3. An NIDS based on this looks for specific traffic in packet captures
  3. 4. should be set first in the BIOS boot order
  4. 5. This virus changes itself in order to thwart anti-virus detection
  5. 8. software that activates malware when certain conditions occur
  6. 9. tool that can show your computer's network connections
  7. 10. This virus uses stealth techniques in an attempt to thwart malware analysts
  8. 11. this malware is capable of hiding files, processes, and user accounts from system administrators
  9. 16. a network of compromised computers controlled by an attacker
  10. 18. helps achieve the security goal of integrity
  11. 20. a type of canned meat or an unwanted email