Module 6 Puzzle

1234567891011121314151617181920
Across
  1. 4. Do this to all unneeded programs/software
  2. 8. Hackers who hack only for legal/ethical purposes
  3. 11. This should be done to large networks to break them up into more manageable networks.
  4. 12. The six Ps of security are: ports, patch, _____, probe, policies, & physical
  5. 14. The process to look for vulnerabilites on a network
  6. 16. One who breaks into a system to do something malicious, illegal, or harmful. A hacker with malicious intent; synonymous with black hat hacker
  7. 17. A utility similar to ping that also tells you what hops it made in getting to the destination and how long it took to get there
  8. 18. Using interpersonal skills to extract information about a computer system and its security
  9. 19. preferred location for storing backups
  10. 20. To send a single ICMP packet to a destination, usually to confirm that the destination can be reached
Down
  1. 1. one of the most prestigious certifications for networking professionals
  2. 2. A numerical designation for a connection point on a computer
  3. 3. Someone who attempts to compromise a system to assess its vulnerability
  4. 5. A reference to how long a user has used a password
  5. 6. Searching through trash looking for information that might be useful in hacking or identity theft
  6. 7. checking a target machine to see what ports are open
  7. 9. The minimum frequency for system probing and audits
  8. 10. A hacker who hacks into systems to accomplish some goal that they feel is valid and legal
  9. 13. Perform system patches, probe for flaws, check logs, and review policies
  10. 15. The most basic rule of computer security is to install these as soon as they are available