ICS 133

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 2. ma'am ron's bebeloves
  2. 3. communications intelligence
  3. 4. will expose minor vulnerabilities
  4. 7. uses the DNS to look up a name
  5. 8. dubious stock investment
  6. 10. bogus message given to computers
  7. 13. communications security
  8. 17. an attack on confidentiality
  9. 19. keeping information secret
  10. 21. protecting information from improper changes
  11. 22. openings in an asset
  12. 24. are protected by a boundary
  13. 27. keeping systems available and in operation
  14. 28. put acoustical and electromagnetic shields around the equipment
  15. 30. disruption of transmissions
  16. 32. malicious software
  17. 33. applies effort but avoids social stigma
  18. 34. also known as cutwail
  19. 37. availability attack
  20. 42. establish a protected area around sensitive devices and block attackers from area
  21. 43. forge the sender’s IP address in a TCP connection; success requires correct
  22. 45. prevents a sender from sending data faster than the recipient can handle it
  23. 46. protects the assets
  24. 47. unsolicited email often distributes frauds
  25. 48. data resides in the ____
  26. 49. automated host configuration
  27. 50. the most secure token
Down
  1. 1. the most common token
  2. 5. he process to establish permission for someone to receive classified information
  3. 6. protects a set of files from access by others
  4. 9. _ names provide memorable names for hosts on the Internet
  5. 11. no special steps ensure availability
  6. 12. email that tries to retrieve authentication data
  7. 14. protects information even when it is not under your physical control
  8. 15. availability attack again
  9. 16. _ law are based on legislative enactments
  10. 18. _ reading grants read access to a set of files
  11. 20. identifies a special category of information that requires protection
  12. 23. infer secrets from patterns in encrypted or otherwise protected traffic
  13. 25. acceptance incorrectly detects a match with a credential and the database
  14. 26. filters on comm and power lines
  15. 29. interactive DNS resolver
  16. 31. creates botnet focused on financial fraud
  17. 35. brief description of threat agent
  18. 36. embed traffic inside a protocol that the firewall always passes, like Web pages
  19. 38. an attacked system is called ____ system
  20. 39. limited damage to assets
  21. 40. _ law are based on judicial decisions
  22. 41. also known as conficker
  23. 44. cause significant damage to assets or some injury to persons, but not critical injury