Cyber Sys Ops Block IV - Unit 6

123456789101112131415
Across
  1. 2. This wired IDS sits on AF networks "listening" for suspicious activity. Generates reports for the AFNOSC (acronym).
  2. 5. Vulnerability scanners compare details about a targeted system against a list of known security ____.
  3. 7. ____ devices pretend to be legitimate access points in order to gather information from those devices connecting to them.
  4. 8. Wireless ____ tools are intended for attacking wireless access points.
  5. 10. An ____ Intrusion Detection System is also known as an Intrusion Prevention System.
  6. 11. NIDS cannot analyze ____ packets.
  7. 13. SNORT is an ____ source Network-based Intrusion Detection and Prevention System.
  8. 15. ____ NIDS abilities include detection of rogue devices and wireless attack tools.
Down
  1. 1. ____ records attributes of the host computer's memory and then monitors it to ensure it hasn't been modified (acronym).
  2. 3. Host-based Intrusion Detections Systems primarily use ____ installed on a specific host.
  3. 4. A ____ Scanner is a software application designed to probe a server or host for open ports.
  4. 6. ____ scanning software detects and classifies system weaknesses in computers & network devices. Run from an attacker's POV.
  5. 9. The function of an IDS is to ___ network traffic and computer settings to detect patterns indicating known intrusion attempts
  6. 12. An Intrusion Detection System scans, audits and monitors network infrastructure for signs of attacks in ____.
  7. 14. A major drawback of ____ is it cannot analyze encrypted packets (acronym).