Across
- 4. a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port
- 5. the fault detection – waiting for a system to fail
- 8. The science of deducing the plaintext from a ciphertext, without knowledge of the key
- 10. The process of writing the malicious code for a particular machine or a particular application is called ---- malicious code
- 12. protocol analyzer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network
- 14. malicious code detected based on the behavior
- 18. a virus that attaches itself to a file and replicates when the infected program is executed
- 21. A computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating
- 23. The process of anticipating the faults and handling them to minimize disruption and maximize the safety
- 24. These are the programs that leak the information
- 26. the fault detection – construct a system that reacts to a failure
Down
- 1. A cryptosystem is a system for encrypting and decrypting data
- 2. is an unforgeable token that gives the possessor certain rights to an object
- 3. – keeps a copy of everything pressed
- 6. The assurance that the communicating entity is the one that it claims to be
- 7. (secure shell) is a pair of protocols defined for Unix
- 9. systems reveal information that could facilitate an attack
- 11. in this Attack- Malicious program exists between two programs
- 13. each program operates as if other routines in the system were malicious or incorrect
- 15. door is an undocumented entry point to a module which has occurred because of the developer
- 16. Provides protection against denial by one of the entities involved in a communication
- 17. defines a single choke point that keeps unauthorized users out of the protected network
- 19. this is a cipher which encrypts a digital data stream one bit or one byte at a time
- 20. The virus that gets lodged in main memory as part of a resident system program and the virus may infect every program that executes
- 22. The study of cryptography and cryptanalysis
- 25. This attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination
