Across
- 2. Cascading _____ Sheets (CSS)
- 3. data from one machine masks others
- 5. law based on judicial decisions
- 7. spreads through email
- 9. _____ Cipher replace each letter in a text by the 3rd letter
- 10. running program
- 13. an attack that is likely to happen
- 16. process to establish permission
- 19. will exploit minor vulnerabilities
- 20. _______ Markup Language
- 21. Structured ______ Language
- 22. two parties rely on a third party
- 23. carried by programs
- 25. an attack on confidentiality
- 29. ______ Sockets Layer (SSL)
- 30. returns details about domain ownership
- 31. makes an attack possible
- 35. Downadup
- 36. Rivest-______-Adleman (RSA)
- 38. IP ______ forge the sender’s IP address
- 41. disruption of transmissions
- 42. no special steps ensure availability
- 43. lists of instructions
- 45. law based on legislative enactments
- 46. group that contains all users
Down
- 1. are protected by a boundary
- 2. DOS attack that sends a forged “ping”
- 3. malicious software
- 4. handled via the “img” tag
- 6. protects the assets
- 8. block some files from sharing
- 11. protocol errors and session shutdown
- 12. protocol key exchange
- 13. uses the DNS to look up a name
- 14. Unsolicited email
- 15. ______ Intelligence (SI)
- 16. Cracking ciphertext
- 17. resolving may be redirected or ________
- 18. law based on religious systems
- 24. modify a system to work for the threat agent
- 26. individuals and companies buy names from
- 27. is detective
- 28. certificate is distributed widely
- 32. Create, Read,_______, Delete
- 33. creates botnet focused on financial fraud
- 34. ______ Correcting Codes (ECC)
- 37. sections that contain variables that change
- 39. tries to retrieve authentication data
- 40. a more elaborate protocol
- 44. protocol data exchange
