Across
- 4. :Process of balancing threats and protection costs for individual assets
- 7. :Limiting who may have access to each resource and limiting permissions to what they are able to do with the resource
- 8. :Formalized plan to reestablish IT operations within a firm
- 11. :Collecting enough data about a victim to impersonate the victim and assume their identity for financial transactions
- 12. :Filtering messages that are arriving at a company’s firewall from an outside source destined for hosts inside the trusted company network
- 15. :The practice and study of techniques for securing confidential communications
- 16. :Method of authentication that uses of a private key :pubic key and a trusted verifier
- 18. :Layers of defense such that all must be breached for an attacker to succeed
- 19. :Worm that will automatically infect other computers without any user interaction
- 21. :Filtering messages that arrive at a company’s firewall from inside the trusted network destined for hosts on the outside
- 23. :deep inspection of application messages across multiple packets to identify malicious activity
- 25. :Intentionally using a computer resource without authorization or in excess of authorization
- 26. :Attackers who use scripts or other applications developed by more experienced attackers
- 27. :Process or program that takes advantage of a known vulnerability
- 29. :Use of cryptographic systems to provide message-by-message authentication and integrity
- 31. :A pair of algorithms used to encrypt and decrypt secure communications
- 32. :Procedures to capture and safeguard data as evidence for criminal court proceedings
- 36. :Use of two authentication methods such as something you know :something you have :or something you are
- 37. :A malicious program that disguises itself as a legitimate system file
- 38. :Long passwords that contain a mix of lowercase letters :uppercase letters :numeral characters :and symbols
- 43. :Attacking your own systems to discover their weaknesses
- 46. :Use of measurements of a person’s attributes for authentication purposes
- 49. :A vulnerability-specific attack that occurs before a patch is available
- 50. :Scripts that travel with the downloaded webpage from the webserver to the browser where they are executed locally
- 52. :DoS attack committed by a distributed number or simultaneous attackers
- 53. :Successful attacks
- 55. :Mandatory directives that must be followed during implementation
- 56. :Formalized plan to reestablish a firm’s ability to continue functioning after a devastating event
- 57. :Methods and processes to ensure policies have been implemented properly
Down
- 1. :Use of authentic-looking e-mail or websites to entice the user to send his or her personal and /or confidential information
- 2. :Cyber-attacks by national governments
- 3. :Lying to get victims to persuade them to do something against their financial self-interest
- 5. :Tricking the victim into doing something against his or her interests
- 6. :A flaw in a program that permits a specific attack or set of attacks against a piece of software or hardware
- 9. :Cyber attackers by terrorists
- 10. :Trusted system or entity that will verify a supplicant’s identity
- 13. :Attempting to guess a password based on dictionary patterns with basic modifications to dictionary words such as capitalization or digit replacement
- 14. :Sample actions taken for policy oversight
- 17. :Instructions that are merely optional guidelines for implementation
- 18. :Making a computer or entire network unavailable to legitimate users by various means
- 20. :Part of a piece of malware that performs malicious actions
- 22. :Hardware or software that examines packets and determines if they are allowed to pass or not
- 24. :A name given to software that collects information about the user and the system without their knowledge and reports this info to another system for tracking
- 28. :Attempting to guess a password by using every possible combination of characters
- 30. :Attempting to guess a password by trying all the words in a standard or custom dictionary
- 33. :Closing off all avenues of attack
- 34. :Pieces of executable code that attach themselves to other programs
- 35. :The attacks and attackers that companies face
- 39. :Entity trying to prove their identity by supplying some form of credentials
- 40. :Username and password combination that are relatively static in nature and are used each time authentication occurs; most common authentication method
- 41. :The actions that a person given access to a resources is allowed to take
- 42. :Method for malware to move to a victim computer
- 44. :Full stand-alone malware programs that operates and or replicates by itself
- 45. :General purpose exploitation programs that can be remotely controlled after installation
- 47. :Broad statements of what should be accomplished :not how to accomplish it
- 48. :Some form of proof of identity
- 51. :Alternate way back into a system
- 54. :General term for any evil software that does harm to your system
