Across
- 2. Originally created in 1969.
- 4. A type of attack in which the traffic to a website is redirected to a fake website by manipulating host file on your system or DNS server.
- 7. A statement or a set of statements adopted by management and binding on all the employees to follow.
- 10. Viruses _______ vulnerabilities in a system to infect it.
- 11. IRDA is a ___________.
- 15. Generally a bug fix.
- 16. US equivalent to Indian MOD.
- 17. Password is to ___________ just as user ID is to Identification.
- 21. Risk ______ - procedure of evaluating all the possibilities and possible impact of things going wrong.
- 23. _________requires constant monitoring in a data center.
- 24. ACL stands for _______ Control List
- 25. Provides backup power.
- 26. Mail _____- sending huge quantities of mails.
- 27. Fulfilling contractual requirements is also a ________ requirement.
- 29. Digital _______ - Science of computer investigation.
- 30. Vulnerability in software is a ____ or a programming flaw which can get exploited leading to unstable behavior.
- 33. Emergency exits always open _________.
- 34. _________ configures and manages a system as per the data owner’s requirements.
- 36. Generates random one time passwords.
- 37. Data _______ defines the security requirements of data.
- 39. Content ______ dynamically inspects the contents being exchanged over mail or web, blocks or logs the communication.
Down
- 1. Ensuring ________ safety is in the scope of information security.
- 3. Your window to the internet.
- 5. Weakest link in information security.
- 6. A server getting infected with virus leads to the loss of ________ of the computer system.
- 8. Information loses its ______ if either or all of the important attributes of information namely Confidentiality, Integrity and Availability are diluted.
- 9. Earliest predecessor of Internet.
- 12. AES is an encryption ___________.
- 13. Personal computers requires ______ as much as office systems.
- 14. Inherent weakness in something which makes it prone to damage.
- 18. Security _________ defines how the information should be handled.
- 19. ______ encrypts hard disk.
- 20. During crisis you should go out and never return or enter from an _______ exit.
- 22. Daily dose of updates for an antivirus.
- 28. Coming out safely from structure in danger.
- 31. A popular antivirus software.
- 32. Blocks unwanted network traffic to your computer.
- 34. An internet browser.
- 35. Division of office space into areas with varying degree of physical access controls.
- 38. Internet related.
