Across
- 3. will exploit minor vulnerabilities
- 11. runs the browser in a restricted environment that limits its access to host files and other resources
- 13. a running program
- 16. we call a device a _____ wheb it serves as a stand-in for a different internet host
- 18. keeping information secret
- 19. _______ section that contain instructions to execute
- 20. two parties rely on a thirds party to help negotiate a settlement
- 21. keeping systems available and in operation
- 23. a compromised systems on a network, all controlled by a single attacker
- 24. system works on behalf of the wrong user
- 26. when the network does not take steps to ensure reliable delivery, we call the packets _____
- 28. security standards for federal computer system
- 29. apply the access rights based on the enclosing directories
- 31. does not directly improve system performance or security
- 33. the process of key changing
- 34. group of instructions
- 36. security standards for certain types of personal health data
- 37. a systematic process that reduces the volume of data by tracking advantage of redundancy in the plaintext
- 40. name: identifies the directory entries to follow to find the file
- 42. transforms readable data into unreadable data using secret information
- 44. modify a system to work for the threat agent
- 45. spread through internet via windows vulnerabilities
- 46. the combined set of subnets
- 48. protecting information from improper changes
- 49. applies effort, but avoids social stigma
- 50. a component that connects the host to other hosts or to the networks
Down
- 1. creates botnet focused on financial fraud
- 2. law based on judicial decisions
- 4. are useless if no one listens
- 5. makes an attack possible
- 6. contains text interpreted by a programming language interpreter
- 7. the term coined by Ted Nelson, who wanted to improve the computing experience
- 8. attack that is likely to happen and worth protecting against
- 9. protects the assets
- 10. recovery from a compromise
- 12. a router is traditionally called a _____
- 14. a botnet and spam package that used to produce 7 million messages a day
- 15. owned by a user, usually the creator
- 17. attacks control logic in industrial plants
- 18. mathematical technique to hide or protect data
- 19. a decision to trust someone in a particularly delicate or sensitive capacity
- 22. single arithmetic operations
- 25. creates a botnet that spreads spam and more malware
- 27. mathematical term for a step-by-step procedure
- 30. bogus messages given to computers
- 32. the numbered ports that can connect to a computer
- 35. when we share a key with two or more people, we refer to that group as being the
- 36. a computer connected to the network
- 38. protects a set of files from access by others
- 39. apply the same access rights to all new files
- 41. malicious software
- 43. data on a hard drive are organized into these independent blocks called _____
- 47. law based on legislative enactments
