Across
- 3. Malware which presents unwanted advertisements
- 11. ___________ is stimuli that has meaning in some context for its receiver
- 12. Virtual _________ Network
- 13. Successfully exploiting vulnerability is known as
- 14. Microsoft Office is an _______ software
- 16. Threat X Vulnerability
- 17. Technology designed to keep the bad guys out
- 20. A terminal emulator / serial console that support SSH
Down
- 1. A Software products which provide real-time analysis of security alerts by network hardware and application
- 2. Bypassing system’s customary security mechanism
- 4. Unplanned disruption or failure of a feature or service
- 5. A Weakness in a system
- 6. Confidentiality,___________,Availability
- 7. The refusal of something requested or desired.
- 8. A fraudulent social engineering attempt to obtain sensitive information
- 9. Should not be shared / kept open to anyone
- 10. Application of investigative analysis on a computer
- 15. _______ makes password / passphrase more secure
- 18. Malicious software that replicates while moving across information systems
- 19. address Numerical label assigned to each device connected in a network that uses the Internet Protocol for communication