Across
- 2. 10. __________is unique time and date stamp identifying when the action took place
- 5. 7._______ record is a fundamental tool for intrusion detection.
- 7. 11. _________condition denotes which, if any, exception condition is raised on return.
- 10. 2.____________user is an individual who seizes supervisory control of the system.
- 11. 4.Other name of Intruder
- 13. 12. _________is a receptor of action
Down
- 1. 5.___________value is used to protect the password file in UNIX.
- 3. 3._________referred as a hacker or cracker
- 4. 1.__________is an individual who is not authorize to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
- 6. 6.________used to protect our network from other networks
- 8. 8. ___________ based anomaly detection is profile the activity of each user is developed and used to detect changes in the behavior of individual accounts.
- 9. 1._______is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
- 12. based 9.____________involves an attempt to define a set of rules that can be used to decide changes in the behavior of individual accounts
