Crossword 133

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
Across
  1. 2. a more elaborate protocol
  2. 4. __________ Resource Locator
  3. 6. first A in ARPANET
  4. 8. malicious software
  5. 10. Risk Management ________
  6. 11. protects information even when it is not under your physical control
  7. 15. Level of Motivation will expoit minor vulnerabilities
  8. 16. a key’s “safe” lifetime
  9. 20. _________ Address Translation (NAT)
  10. 23. spreads through email & creates a botnet that spreads spam and more malware
  11. 25. type of attack that modify a system to work for the threat agent
  12. 27. type of Cipher Replace each letter in a text by the 3rd letter following it in the alphabet:
  13. 28. type of complaint wherein a person is charged with breaking specific laws.
  14. 29. types of access control strategy Cryptography Kerckhoff,Shannon
  15. 30. Unsolicited email; often distributes frauds
  16. 31. attacks control logic in industrial plants, probable target was Iranian nuclear sites
  17. 32. a type of law wherein based on judicial decisions
  18. 33. ____________ poisoning resolver receives a bogus response to a DNS request
  19. 34. set of people or devices that all share the same secret key
  20. 37. ________ Worm first major Internet worm
  21. 40. a type of law wherein based on legislative enactments
  22. 42. _______ Control Message Protocol (ICMP)
  23. 43. D in CRUD
  24. 44. a simple and popular protocol
  25. 46. C in CRUD
Down
  1. 1. type of Cipher Named after a 16th century author
  2. 3. type of Tokens that Stores an unchanging credential.
  3. 5. User ______ Protocol (UDP)
  4. 7. type of attack that bogus messages given to computers
  5. 9. (ACK)
  6. 12. a type of law wherein based on religious systems And or documents.
  7. 13. type of attack in which maliciously create or modify
  8. 14. Sarbaines-Oxley financial and accounting standards for public companies
  9. 17. interactive DNS resolver
  10. 18. Dynamic _________ Control Protocol (DHCP)
  11. 19. U in CRUD
  12. 21. ________ contain text interpreted by a programming language interpreter
  13. 22. The ________ procedure in the operating system (OS) switches running processes
  14. 24. two parties rely on a third party, the mediator, to help negotiate a settlement.
  15. 26. authentication for DNS responses
  16. 35. Email that tries to retrieve authentication data
  17. 36. ________ Attack, DOS attack that sends a forged “ping” using a broadcast address to amplify the number of replies produced
  18. 38. Secure ________ Layer (SSL)
  19. 39. Level of Motivation that can cause significant damage to assets or some injury to persons, but not critical injury
  20. 40. Transmission _______ Protocol (TCP)
  21. 41. ________ Private Networks (VPNs)
  22. 45. creates botnet focused on financial fraud
  23. 47. R in CRUD