Network Security

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
Across
  1. 4. Use of cryptographic systems to provide message-by-message authentication and integrity
  2. 6. Cyber-attacks by national governments
  3. 8. The attacks and attackers that companies face
  4. 9. Layers of defense such that all must be breached for an attacker to succeed
  5. 11. Method for malware to move to a victim computer
  6. 14. Tricking the victim into doing something against his or her interests
  7. 17. Attackers who use scripts or other applications developed by more experienced attackers
  8. 18. Worm that will automatically infect other computers without any user interaction
  9. 20. A vulnerability-specific attack that occurs before a patch is available
  10. 21. Some form of proof of identity
  11. 22. Attempting to guess a password by using every possible combination of characters
  12. 25. Mandatory directives that must be followed during implementation
  13. 27. Entity trying to prove their identity by supplying some form of credentials
  14. 30. Attempting to guess a password based on dictionary patterns with basic modifications to dictionary words such as capitalization or digit replacement
  15. 33. Scripts that travel with the downloaded webpage from the webserver to the browser where they are executed locally
  16. 36. Method of authentication that uses of a private key, pubic key and a trusted verifier
  17. 38. Broad statements of what should be accomplished, not how to accomplish it
  18. 39. Attempting to guess a password by trying all the words in a standard or custom dictionary
  19. 42. Long passwords that contain a mix of lowercase letters, uppercase letters, numeral characters, and symbols
  20. 44. Lying to get victims to persuade them to do something against their financial self-interest
  21. 45. Formalized plan to reestablish a firm’s ability to continue functioning after a devastating event
  22. 46. Full stand-alone malware programs that operates and or replicates by itself
  23. 47. A flaw in a program that permits a specific attack or set of attacks against a piece of software or hardware
  24. 49. Instructions that are merely optional guidelines for implementation
  25. 51. Process of balancing threats and protection costs for individual assets
  26. 53. A name given to software that collects information about the user and the system without their knowledge and reports this info to another system for tracking
  27. 54. Attacking your own systems to discover their weaknesses
  28. 56. Collecting enough data about a victim to impersonate the victim and assume their identity for financial transactions
  29. 57. Intentionally using a computer resource without authorization or in excess of authorization
Down
  1. 1. The actions that a person given access to a resources is allowed to take
  2. 2. A pair of algorithms used to encrypt and decrypt secure communications
  3. 3. Methods and processes to ensure policies have been implemented properly
  4. 5. deep inspection of application messages across multiple packets to identify malicious activity
  5. 7. Procedures to capture and safeguard data as evidence for criminal court proceedings
  6. 9. Formalized plan to reestablish IT operations within a firm
  7. 10. Hardware or software that examines packets and determines if they are allowed to pass or not
  8. 12. Use of authentic-looking e-mail or websites to entice the user to send his or her personal and/or confidential information
  9. 13. Cyber attackers by terrorists
  10. 15. Part of a piece of malware that performs malicious actions
  11. 16. The practice and study of techniques for securing confidential communications
  12. 19. Alternate way back into a system
  13. 23. Process or program that takes advantage of a known vulnerability
  14. 24. Successful attacks
  15. 26. Filtering messages that are arriving at a company’s firewall from an outside source destined for hosts inside the trusted company network
  16. 28. Pieces of executable code that attach themselves to other programs
  17. 29. A malicious program that disguises itself as a legitimate system file
  18. 31. Username and password combination that are relatively static in nature and are used each time authentication occurs; most common authentication method
  19. 32. Use of two authentication methods such as something you know, something you have, or something you are
  20. 34. Closing off all avenues of attack
  21. 35. DoS attack committed by a distributed number or simultaneous attackers
  22. 37. Filtering messages that arrive at a company’s firewall from inside the trusted network destined for hosts on the outside
  23. 40. Limiting who may have access to each resource and limiting permissions to what they are able to do with the resource
  24. 41. Use of measurements of a person’s attributes for authentication purposes
  25. 43. General term for any evil software that does harm to your system
  26. 48. Trusted system or entity that will verify a supplicant’s identity
  27. 50. Making a computer or entire network unavailable to legitimate users by various means
  28. 52. Sample actions taken for policy oversight
  29. 55. General purpose exploitation programs that can be remotely controlled after installation