ITS2210 Module 6 Crossword

1234567891011121314151617181920
Across
  1. 5. Using interpersonal skills to extract information about a computer system and its security
  2. 7. Perform system patches, probe for flaws, check logs, and review policies
  3. 8. the most basic rule of computer security is to install these
  4. 11. The minimum frequency for system probing and audits
  5. 12. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
  6. 13. One who hacks into systems to accomplish some goal that they feel is ethically valid
  7. 14. The most prestigious certification for networking professionals
  8. 17. The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
  9. 19. this should be done to large networks to break them up into more manageable networks
  10. 20. A reference to how long a user has used a password
Down
  1. 1. Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
  2. 2. preferred location for storing backups
  3. 3. Hackers who hack only for legal/ethical purposes
  4. 4. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
  5. 6. The process to scan a network looking for vulnerabilities
  6. 9. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
  7. 10. A numerical designation for a connection point on a computer
  8. 15. Someone who attempts to compromise a system to assess its vulnerability
  9. 16. this should be done to all unneeded programs/software on a server
  10. 18. the six Ps of security are: ports, patch, _____, probe, policies, physical