Across
- 2. a more elaborate protocol
- 4. __________ Resource Locator
- 6. first A in ARPANET
- 8. malicious software
- 10. Risk Management ________
- 11. protects information even when it is not under your physical control
- 15. Level of Motivation will expoit minor vulnerabilities
- 16. a key’s “safe” lifetime
- 20. _________ Address Translation (NAT)
- 23. spreads through email & creates a botnet that spreads spam and more malware
- 25. type of attack that modify a system to work for the threat agent
- 27. type of Cipher Replace each letter in a text by the 3rd letter following it in the alphabet:
- 28. type of complaint wherein a person is charged with breaking specific laws.
- 29. types of access control strategy Cryptography Kerckhoff,Shannon
- 30. Unsolicited email; often distributes frauds
- 31. attacks control logic in industrial plants, probable target was Iranian nuclear sites
- 32. a type of law wherein based on judicial decisions
- 33. ____________ poisoning resolver receives a bogus response to a DNS request
- 34. set of people or devices that all share the same secret key
- 37. ________ Worm first major Internet worm
- 40. a type of law wherein based on legislative enactments
- 42. _______ Control Message Protocol (ICMP)
- 43. D in CRUD
- 44. a simple and popular protocol
- 46. C in CRUD
Down
- 1. type of Cipher Named after a 16th century author
- 3. type of Tokens that Stores an unchanging credential.
- 5. User ______ Protocol (UDP)
- 7. type of attack that bogus messages given to computers
- 9. (ACK)
- 12. a type of law wherein based on religious systems And or documents.
- 13. type of attack in which maliciously create or modify
- 14. Sarbaines-Oxley financial and accounting standards for public companies
- 17. interactive DNS resolver
- 18. Dynamic _________ Control Protocol (DHCP)
- 19. U in CRUD
- 21. ________ contain text interpreted by a programming language interpreter
- 22. The ________ procedure in the operating system (OS) switches running processes
- 24. two parties rely on a third party, the mediator, to help negotiate a settlement.
- 26. authentication for DNS responses
- 35. Email that tries to retrieve authentication data
- 36. ________ Attack, DOS attack that sends a forged “ping” using a broadcast address to amplify the number of replies produced
- 38. Secure ________ Layer (SSL)
- 39. Level of Motivation that can cause significant damage to assets or some injury to persons, but not critical injury
- 40. Transmission _______ Protocol (TCP)
- 41. ________ Private Networks (VPNs)
- 45. creates botnet focused on financial fraud
- 47. R in CRUD
