1:00
en
CR
Security Puzzle May 2013 First BiWeekly
9
cia : The three key concepts of the Information Security Triad (3)
defenseindepth : An approach to implement multiple layers of security controls in an organisation (7,2,5)
accesscontrol : Selective restriction of access to a place or resource (6,7)
mantrap : Physical security devices or constructions designed to entrap a human (7)
exploit : Sequence of commands that takes advantage of a bug, glitch or vulnerability (7)
vulnerability : A weakness which allows an attacker to reduce a system's information assurance (13)
test : Penetration _______ (4) Done to find and mitigate vulnerabilities on Servers and Systems
patch : piece of software designed to fix problems (5)
socket : Network _______ (6) is network interface- an endpoint of an inter-process communication flow across a computer network
Security Puzzle May 2013 First BiWeekly
Across:4. | Sequence of commands that takes advantage of a bug, glitch or vulnerability (7) | 5. | Physical security devices or constructions designed to entrap a human (7) |
| 7. | Penetration _______ (4) Done to find and mitigate vulnerabilities on Servers and Systems | 8. | An approach to implement multiple layers of security controls in an organisation (7,2,5) |
| | Down:1. | A weakness which allows an attacker to reduce a system's information assurance (13) | 2. | Network _______ (6) is network interface- an endpoint of an inter-process communication flow across a computer network | 3. | The three key concepts of the Information Security Triad (3) |
| 6. | Selective restriction of access to a place or resource (6,7) | 9. | piece of software designed to fix problems (5) |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only
Security Puzzle May 2013 First BiWeekly
Across:4. | Sequence of commands that takes advantage of a bug, glitch or vulnerability (7) | 5. | Physical security devices or constructions designed to entrap a human (7) |
| 7. | Penetration _______ (4) Done to find and mitigate vulnerabilities on Servers and Systems | 8. | An approach to implement multiple layers of security controls in an organisation (7,2,5) |
| | Down:1. | A weakness which allows an attacker to reduce a system's information assurance (13) | 2. | Network _______ (6) is network interface- an endpoint of an inter-process communication flow across a computer network | 3. | The three key concepts of the Information Security Triad (3) |
| 6. | Selective restriction of access to a place or resource (6,7) | 9. | piece of software designed to fix problems (5) |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only