Across
- 2. this type of attack can compromise the security goal of availability
- 5. type of firewall that protects an individual computer
- 6. allows a remote attacker to connect to your system via the network
- 7. a false alert from an IDS
- 12. helps achieve the security goal of confidentiality
- 13. an individual computer that is part of a botnet
- 14. an intrusion detection system that monitors an individual computer
- 15. malware that self-replicates
- 17. software used for whole disk encryption
- 19. a popular RAT (remote access trojan)
Down
- 1. an intrusion detection system that monitors network traffic
- 3. An NIDS based on this looks for specific traffic in packet captures
- 4. should be set first in the BIOS boot order
- 5. This virus changes itself in order to thwart anti-virus detection
- 8. software that activates malware when certain conditions occur
- 9. tool that can show your computer's network connections
- 10. This virus uses stealth techniques in an attempt to thwart malware analysts
- 11. this malware is capable of hiding files, processes, and user accounts from system administrators
- 16. a network of compromised computers controlled by an attacker
- 18. helps achieve the security goal of integrity
- 20. a type of canned meat or an unwanted email
