Across
- 2. creates botnet focused on financial fraud
- 4. based on judicial decisions
- 10. an attack on confidentiality
- 15. Application Programming __________ (API)
- 19. identifies a special category of information that requires protection
- 20. system works on behalf of the wrong user
- 22. keeping systems available and in operation
- 24. Email that tries to retrieve authentication data
- 25. two parties rely on a third party, the mediator, to help negotiate a settlement
- 28. the most common type of token
- 29. the process to establish permission for someone to receive classified information
- 31. first major Internet worm
- 34. User ________ Protocol (UDP)
- 35. malicious software
- 36. based on religious systems and/or documents
- 37. name translation for other services
- 38. attacks control logic in industrial plants
- 39. based on legislative enactments
- 40. automated host configuration
- 43. ________ Cipher is named after a 16th century author
- 44. also means Cracking ciphertext
- 45. type of matching that looks for an exact match with specific features
- 46. Transmission ________ Protocol (TCP)
- 47. Internet Control ________ Protocol (ICMP)
- 48. group of instructions
Down
- 1. ________ Redundancy Checks (CRCs)
- 3. contain text interpreted by a programming language interpreter
- 5. _____ Control prevents a sender from sending data faster than the recipient can handle it
- 6. safe deposit box
- 7. the most secure type of token
- 8. bogus messages given to computers
- 9. ________ Cipher replaces each letter in a text by the 3rd letter following it in the alphabet
- 11. modify a system to work for the threat agent
- 12. False ________ fails to detect a match between a credential and the database
- 13. email servers that carry spam
- 14. establish a protected area around sensitive devices and block attackers from area
- 16. keeping information secret
- 17. type of matching that calculates likelihood that an email is spam
- 18. put acoustical and electromagnetic shields around the equipment
- 21. _____ File System (UFS)
- 22. False ________ incorrectly detects a match with a credential and the database
- 23. a more elaborate protocol
- 26. Unsolicited email; often distributes frauds
- 27. lists of email servers that actively avoid handling spam
- 30. Create, Read, Update, Delete
- 32. ________ Mail Transfer Protocol (SMTP)
- 33. make decisions based on similarities
- 41. protects information even when it is not under your physical control
- 42. uses the DNS to look up a name
- 47. Microsoft’s Message API (Exchange)
