Across
- 3. A communication to or input of an object
- 4. A life cycle model that allows for multiple iterations of a waterfall-style process
- 6. In this type of networks the chains of computational units are used in an attempt to imitate the biological reasoning process of the human mind.
- 11. Internal code that defines the actions an object performs in response to a message
- 12. A level of interaction between objects.
- 14. A state that allows users to bypass failed security controls, erring on the side of permissiveness.
- 15. A characteristics of a database transactions that follows an “all-or-nothing” affair.
- 16. Describes the strength of the relationship between the purposes of the methods within the same class.
Down
- 1. The formalized processes by which trust is built into the life cycle of a system.
- 2. A phase of IDEAL model, in which engineers analyze the current state of the organization and make general recommendations for change.
- 5. A characteristic of an object that allows it to respond with different behaviors to the same message or method because of changes in external conditions.
- 7. A preventive security mechanism that endeavors to make certain that the information stored in the database is always correct or at least has its integrity and availability protected.
- 8. The ...-based methods analyze the behavior of software, looking for the telltale signs of virus activity, such as attempts to elevate privilege level, cover their electronic tracks, and alter unrelated or operating system fi les.
- 9. A highly sophisticated worm widely spread in mid-2010 which uses a variety of advanced techniques to spread, including multiple previously undocumented vulnerabilities
- 10. A database feature that allows applications to communicate with different types of databases without having to be directly programmed for interaction with each type.
- 13. A tool that converts the higher-level language into an executable file designed for use on a specific operating system
