unit5

12345678910111213
Across
  1. 2. 10. __________is unique time and date stamp identifying when the action took place
  2. 5. 7._______ record is a fundamental tool for intrusion detection.
  3. 7. 11. _________condition denotes which, if any, exception condition is raised on return.
  4. 10. 2.____________user is an individual who seizes supervisory control of the system.
  5. 11. 4.Other name of Intruder
  6. 13. 12. _________is a receptor of action
Down
  1. 1. 5.___________value is used to protect the password file in UNIX.
  2. 3. 3._________referred as a hacker or cracker
  3. 4. 1.__________is an individual who is not authorize to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
  4. 6. 6.________used to protect our network from other networks
  5. 8. 8. ___________ based anomaly detection is profile the activity of each user is developed and used to detect changes in the behavior of individual accounts.
  6. 9. 1._______is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
  7. 12. based 9.____________involves an attempt to define a set of rules that can be used to decide changes in the behavior of individual accounts