ICS 133

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 2. disruption of transmissions
  2. 6. communications security
  3. 8. bogus message given to computers
  4. 10. also known as cutwail
  5. 11. an attacked system is called ____ system
  6. 13. automated host configuration
  7. 14. infer secrets from patterns in encrypted or otherwise protected traffic
  8. 17. data resides in the ____
  9. 18. all are cleared, but not for all compartments or code word
  10. 20. an attack on confidentiality
  11. 21. dubious stock investment
  12. 26. keeping systems available and in operation
  13. 27. the most secure token
  14. 28. put acoustical and electromagnetic shields around the equipment
  15. 29. keeping information secret
  16. 34. applies effort but avoids social stigma
  17. 37. creates botnet focused on financial fraud
  18. 38. availability attack again
  19. 40. interactive DNS resolver
  20. 42. prevents a sender from sending data faster than the recipient can handle it
  21. 43. are protected by a boundary
  22. 44. acceptance incorrectly detects a match with a credential and the database
  23. 45. unsolicited email often distributes frauds
  24. 46. _ reading grants read access to a set of files
  25. 47. protecting information from improper changes
  26. 48. no special steps ensure availability
Down
  1. 1. ma'am ron's bebeloves
  2. 3. cause significant damage to assets or some injury to persons, but not critical injury
  3. 4. protects information even when it is not under your physical control
  4. 5. _ law are based on judicial decisions
  5. 7. _ law are based on legislative enactments
  6. 9. limited damage to assets
  7. 10. email that tries to retrieve authentication data
  8. 12. openings in an asset
  9. 13. _ names provide memorable names for hosts on the Internet
  10. 15. communications intelligence
  11. 16. identifies a special category of information that requires protection
  12. 19. availability attack
  13. 22. the most common token
  14. 23. malicious software
  15. 24. embed traffic inside a protocol that the firewall always passes, like Web pages
  16. 25. filters on comm and power lines
  17. 30. establish a protected area around sensitive devices and block attackers from area
  18. 31. forge the sender’s IP address in a TCP connection; success requires correct
  19. 32. protects the assets
  20. 33. brief description of threat agent
  21. 35. uses the DNS to look up a name
  22. 36. also known as conficker
  23. 39. he process to establish permission for someone to receive classified information
  24. 41. protects a set of files from access by others
  25. 46. will expose minor vulnerabilities