Across
- 2. ma'am ron's bebeloves
- 3. communications intelligence
- 4. will expose minor vulnerabilities
- 7. uses the DNS to look up a name
- 8. dubious stock investment
- 10. bogus message given to computers
- 13. communications security
- 17. an attack on confidentiality
- 19. keeping information secret
- 21. protecting information from improper changes
- 22. openings in an asset
- 24. are protected by a boundary
- 27. keeping systems available and in operation
- 28. put acoustical and electromagnetic shields around the equipment
- 30. disruption of transmissions
- 32. malicious software
- 33. applies effort but avoids social stigma
- 34. also known as cutwail
- 37. availability attack
- 42. establish a protected area around sensitive devices and block attackers from area
- 43. forge the sender’s IP address in a TCP connection; success requires correct
- 45. prevents a sender from sending data faster than the recipient can handle it
- 46. protects the assets
- 47. unsolicited email often distributes frauds
- 48. data resides in the ____
- 49. automated host configuration
- 50. the most secure token
Down
- 1. the most common token
- 5. he process to establish permission for someone to receive classified information
- 6. protects a set of files from access by others
- 9. _ names provide memorable names for hosts on the Internet
- 11. no special steps ensure availability
- 12. email that tries to retrieve authentication data
- 14. protects information even when it is not under your physical control
- 15. availability attack again
- 16. _ law are based on legislative enactments
- 18. _ reading grants read access to a set of files
- 20. identifies a special category of information that requires protection
- 23. infer secrets from patterns in encrypted or otherwise protected traffic
- 25. acceptance incorrectly detects a match with a credential and the database
- 26. filters on comm and power lines
- 29. interactive DNS resolver
- 31. creates botnet focused on financial fraud
- 35. brief description of threat agent
- 36. embed traffic inside a protocol that the firewall always passes, like Web pages
- 38. an attacked system is called ____ system
- 39. limited damage to assets
- 40. _ law are based on judicial decisions
- 41. also known as conficker
- 44. cause significant damage to assets or some injury to persons, but not critical injury
