ICS133 Computer Security and Information Assurance

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 2. creates botnet focused on financial fraud
  2. 4. based on judicial decisions
  3. 10. an attack on confidentiality
  4. 15. Application Programming __________ (API)
  5. 19. identifies a special category of information that requires protection
  6. 20. system works on behalf of the wrong user
  7. 22. keeping systems available and in operation
  8. 24. Email that tries to retrieve authentication data
  9. 25. two parties rely on a third party, the mediator, to help negotiate a settlement
  10. 28. the most common type of token
  11. 29. the process to establish permission for someone to receive classified information
  12. 31. first major Internet worm
  13. 34. User ________ Protocol (UDP)
  14. 35. malicious software
  15. 36. based on religious systems and/or documents
  16. 37. name translation for other services
  17. 38. attacks control logic in industrial plants
  18. 39. based on legislative enactments
  19. 40. automated host configuration
  20. 43. ________ Cipher is named after a 16th century author
  21. 44. also means Cracking ciphertext
  22. 45. type of matching that looks for an exact match with specific features
  23. 46. Transmission ________ Protocol (TCP)
  24. 47. Internet Control ________ Protocol (ICMP)
  25. 48. group of instructions
Down
  1. 1. ________ Redundancy Checks (CRCs)
  2. 3. contain text interpreted by a programming language interpreter
  3. 5. _____ Control prevents a sender from sending data faster than the recipient can handle it
  4. 6. safe deposit box
  5. 7. the most secure type of token
  6. 8. bogus messages given to computers
  7. 9. ________ Cipher replaces each letter in a text by the 3rd letter following it in the alphabet
  8. 11. modify a system to work for the threat agent
  9. 12. False ________ fails to detect a match between a credential and the database
  10. 13. email servers that carry spam
  11. 14. establish a protected area around sensitive devices and block attackers from area
  12. 16. keeping information secret
  13. 17. type of matching that calculates likelihood that an email is spam
  14. 18. put acoustical and electromagnetic shields around the equipment
  15. 21. _____ File System (UFS)
  16. 22. False ________ incorrectly detects a match with a credential and the database
  17. 23. a more elaborate protocol
  18. 26. Unsolicited email; often distributes frauds
  19. 27. lists of email servers that actively avoid handling spam
  20. 30. Create, Read, Update, Delete
  21. 32. ________ Mail Transfer Protocol (SMTP)
  22. 33. make decisions based on similarities
  23. 41. protects information even when it is not under your physical control
  24. 42. uses the DNS to look up a name
  25. 47. Microsoft’s Message API (Exchange)