Information Security Crossword - 11

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 2. Originally created in 1969.
  2. 4. A type of attack in which the traffic to a website is redirected to a fake website by manipulating host file on your system or DNS server.
  3. 7. A statement or a set of statements adopted by management and binding on all the employees to follow.
  4. 10. Viruses _______ vulnerabilities in a system to infect it.
  5. 11. IRDA is a ___________.
  6. 15. Generally a bug fix.
  7. 16. US equivalent to Indian MOD.
  8. 17. Password is to ___________ just as user ID is to Identification.
  9. 21. Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
  10. 23. _________requires constant monitoring in a data center.
  11. 24. ACL stands for _______ Control List
  12. 25. Provides backup power.
  13. 26. Mail _____- sending huge quantities of mails.
  14. 27. Fulfilling contractual requirements is also a ________ requirement.
  15. 29. Digital _______ - Science of computer investigation.
  16. 30. Vulnerability in software is a ____ or a programming flaw which can get exploited leading to unstable behavior.
  17. 33. Emergency exits always open _________.
  18. 34. _________ configures and manages a system as per the data owner’s requirements.
  19. 36. Generates random one time passwords.
  20. 37. Data _______ defines the security requirements of data.
  21. 39. Content ______ dynamically inspects the contents being exchanged over mail or web, blocks or logs the communication.
Down
  1. 1. Ensuring ________ safety is in the scope of information security.
  2. 3. Your window to the internet.
  3. 5. Weakest link in information security.
  4. 6. A server getting infected with virus leads to the loss of ________ of the computer system.
  5. 8. Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
  6. 9. Earliest predecessor of Internet.
  7. 12. AES is an encryption ___________.
  8. 13. Personal computers requires ______ as much as office systems.
  9. 14. Inherent weakness in something which makes it prone to damage.
  10. 18. Security _________ defines how the information should be handled.
  11. 19. ______ encrypts hard disk.
  12. 20. During crisis you should go out and never return or enter from an _______ exit.
  13. 22. Daily dose of updates for an antivirus.
  14. 28. Coming out safely from structure in danger.
  15. 31. A popular antivirus software.
  16. 32. Blocks unwanted network traffic to your computer.
  17. 34. An internet browser.
  18. 35. Division of office space into areas with varying degree of physical access controls.
  19. 38. Internet related.