Across
- 2. disruption of transmissions
- 6. communications security
- 8. bogus message given to computers
- 10. also known as cutwail
- 11. an attacked system is called ____ system
- 13. automated host configuration
- 14. infer secrets from patterns in encrypted or otherwise protected traffic
- 17. data resides in the ____
- 18. all are cleared, but not for all compartments or code word
- 20. an attack on confidentiality
- 21. dubious stock investment
- 26. keeping systems available and in operation
- 27. the most secure token
- 28. put acoustical and electromagnetic shields around the equipment
- 29. keeping information secret
- 34. applies effort but avoids social stigma
- 37. creates botnet focused on financial fraud
- 38. availability attack again
- 40. interactive DNS resolver
- 42. prevents a sender from sending data faster than the recipient can handle it
- 43. are protected by a boundary
- 44. acceptance incorrectly detects a match with a credential and the database
- 45. unsolicited email often distributes frauds
- 46. _ reading grants read access to a set of files
- 47. protecting information from improper changes
- 48. no special steps ensure availability
Down
- 1. ma'am ron's bebeloves
- 3. cause significant damage to assets or some injury to persons, but not critical injury
- 4. protects information even when it is not under your physical control
- 5. _ law are based on judicial decisions
- 7. _ law are based on legislative enactments
- 9. limited damage to assets
- 10. email that tries to retrieve authentication data
- 12. openings in an asset
- 13. _ names provide memorable names for hosts on the Internet
- 15. communications intelligence
- 16. identifies a special category of information that requires protection
- 19. availability attack
- 22. the most common token
- 23. malicious software
- 24. embed traffic inside a protocol that the firewall always passes, like Web pages
- 25. filters on comm and power lines
- 30. establish a protected area around sensitive devices and block attackers from area
- 31. forge the sender’s IP address in a TCP connection; success requires correct
- 32. protects the assets
- 33. brief description of threat agent
- 35. uses the DNS to look up a name
- 36. also known as conficker
- 39. he process to establish permission for someone to receive classified information
- 41. protects a set of files from access by others
- 46. will expose minor vulnerabilities
