Across
- 5. Using interpersonal skills to extract information about a computer system and its security
- 7. Perform system patches, probe for flaws, check logs, and review policies
- 8. the most basic rule of computer security is to install these
- 11. The minimum frequency for system probing and audits
- 12. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
- 13. One who hacks into systems to accomplish some goal that they feel is ethically valid
- 14. The most prestigious certification for networking professionals
- 17. The process to search through trash looking for information that might be useful in hacking (particularly social engineering) or identity theft
- 19. this should be done to large networks to break them up into more manageable networks
- 20. A reference to how long a user has used a password
Down
- 1. Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
- 2. preferred location for storing backups
- 3. Hackers who hack only for legal/ethical purposes
- 4. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
- 6. The process to scan a network looking for vulnerabilities
- 9. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
- 10. A numerical designation for a connection point on a computer
- 15. Someone who attempts to compromise a system to assess its vulnerability
- 16. this should be done to all unneeded programs/software on a server
- 18. the six Ps of security are: ports, patch, _____, probe, policies, physical
