Across
- 4. A Public-Key Cryptography that encrypt data readable only by the recipient and verify that particular sender encrypted a particular message.
- 5. It is a running program.
- 9. A type of error that fails to detect a match between a credential and the database.
- 10. An Industry Security Standards from a family of international standards for security system quality improvement.
- 14. A ____________ attack uses a list of likely passwords as the password space.
- 17. A stronger secret key building blocks that use wrapping technique to protect keys carried in network messages.
- 18. A level of motivation that applies effort, but avoids social stigma.
- 21. A stronger secret key building blocks where the center distributes wrapped keys and authorized users to share a secret with it.
- 23. A US Government standards for financial and accounting standards for public companies. (Acronym)
- 25. It is the amount of lead time required to set up the attack.
- 27. A transport layer security that was developed by netscape in 1994 and is a part of commercial client or server Web package. It is the first really successful public-key application.
- 28. An Industry Security Standards that uses the banking industry to protect electronic funds transfers.
- 30. The most secure type of token that stores a secret that generates a different credential for each login.
- 32. An attack on DNS where the resolver receives a bogus response to a DNS request.
- 33. A US Government security standards for certain types of personal health data. (Acronym)
- 34. The most common type of token that stores an unchanging credential.
- 37. A tailored policy where it share some blocked files.
- 40. It is a group of instructions.
- 41. A type of error that incorrectly detects a match with a credential and the database.
- 42. The __________ procedure in the operating system (OS) switches running processes.
- 45. "Data in motion", A basic state that is being moved from one place to another.
- 46. A Public-Key Cryptography that constructs a shared secret from information shared in public.
- 48. A tailored policy where it block some files from sharing.
- 49. A US Government standards for protecting personal financial information. (Acronym)
- 50. A modern malware where a botnet and spam package that used to produce 7 million messages a day.
Down
- 1. A malicious software is called a _______.
- 2. It is the number and types of people required for the attack.
- 3. It summarizes the attack in the Attack Case Study.
- 6. A modern malware that attacks control logic in industrial plants.
- 7. A stronger secret key building blocks that generate a new key using a one-way hash.
- 8. It is the first major Internet worm in 1988 that disabled about 10% of Internet computers.
- 11. A tailored policy where it gives full rights for some users.
- 12. A global policy that let users share their files
- 13. "Data at rest", A basic state that stores data or information in a computer and is not being processed.
- 15. A policy alternative that modify rights for specific sets of files.
- 16. _______ ____________ are stored in a control section and executed by the CPU.
- 19. It is the brief description of threat agent in the Attack Case Study.
- 20. A level of motivation that will exploit minor vulnerabilities.
- 22. A policy alternative that applied to all users by default.
- 24. A modern malware that creates botnet focused on financial fraud.
- 26. A global policy that keep users separate
- 29. It uses a PRNG to transform the current key into a new one and separate endpoints that can apply the same PRNG to yield the same key.
- 31. A US Government security standards for federal computer systems. (Acronym)
- 35. A basic state that is being used by an active process and is usually stored in RAM.
- 36. A ____ _______ prevents a sender from sending data transfer than the recipient can handle it.
- 38. A modern malware that – spreads through email and creates a botnet that spreads spam and more malware.
- 39. acceptance rate The likelihood of incorrectly authenticating someone as an authorized user.
- 43. An Industry Security Standards that is used by “Payment Card Industry” to protect credit card transactions.
- 44. A modern malware that spreads through the Internet via Windows vulnerabilities and created a botnet used for spam and malware distribution.
- 47. _______ contain text interpreted by a programming language interpreter.
