Across
- 3. stripping one llayer's headers and passing the rest of the packet up to next higher layer
- 5. sequence of eight bits
- 6. e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website
- 9. approval, permission, or empowerment for someone or something to do something
- 11. hidden, self-replicating section of computer software that inserts itself and becomes part of the another program
- 12. repudiation prove that a user sent a message and the message has not been altered
- 13. basic communication language or "protocol" of the Internet
- 14. Transfer Protocol TCP/IP protocol specifying the transfer of text or binary files across the network
- 15. injection type of input validation attack where SQL code is inserted into application queries to manipulate the database
Down
- 1. address pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1)
- 2. gaining unauthorized logical access to sensitive data by circumventing a system's protections
- 4. process of confirming the correctness of the claimed identity
- 7. code software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse)
- 8. encrypted form of the message being sent
- 10. force cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one