Home
My Puzzles
FAQ
Report bug
Collected Puzzles
User listed puzzles
Random Puzzle
Log In/Out

1 2      
  3   4
5                            
6   7                
    8   9   10 11    
12                   13      
    14          
    15                      
16                  
        17 18      
  19                             20
            21    
22                     23                  
           
24     25             26                  
         
  27         28  
    29 30       31          
              32
      33          
      34                
    35                    
      36          
  37         38          
         
39 40                 41
42         43                
44             45        

Across
2.unsolicited emails
5.identifies a special category of information that requires protection
6.uses the DNS to look up a name
10.a standardized network protocol used on Internet Protocol networks.
12.returns basic information stored about the domain
15.a way of generating a random internal key whenever there is a file encryption (2 Words)
16.a three-part protocol that errors and session shutdown are shown
18.wireless encryption that has an 24-bit initialization vector
19.the developer of the XOR operation (2 Words)
22.a TCP/IP attack that sends lots of SYN packets to produce "half open connection" (2 Words)
23.a result of plaintext encryption using the cipher algorithm
24.a key distribution strategy that has one per endpoint pair
26.a WPA 2 wireless encryption that creates new encryption keys each time users log on to the network with their unique passwords
27.the center that distributes wrapped keys
30.a type of cryptography that uses two different keys
33.a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
34.helps remote access users connect to a variety of network resources through a public data network
35.a multilevel security challenge where it is hard to remove all sensitive data from the document
36.example of these are spies or agents
37.something that is in a TCP packet (2 Words)
40.an authentication server used by WPA 2 enterprise
42.wireless encryption that is backward compatible with WEP
43.process of establishing permission for someone
44.is the process of securing data transmissions from being infiltrated, exploited or intercepted by an individual, application or device
45.a system software for creating and managing databases
Down
1.converts IP addresses into names and vice versa
2.forging the sender's IP address in a TCP connection
3.a utility that is implemented by ICMP
4.a protocol used to retrieve web pages
5.a U.S government standard published by NIST
7.developed by Netscape in 1994
8.this prevents a sender from sending data faster that the recipient can handle (2 Words)
9.an ICMP exploit that reroutes data for one host to traverse a different host
11.a three-part protocol that exchanges keys
12.a web site that constructs pages on demand
13.an internet transfer protocol used for efficient transmission without retransmission
14.a code-word for the problem of data transmitted by physical noise
17.DOS attack that sends forged ping using broadcast address to amplify number of replies (2 Words)
20.a level of risk that a person with skill would damage a file no matter how protected it is
21.process of conversion of encrypted text into plaintext
24.a social engineering attack that lets a user visit a bogus site
25.a process of changing keys to protect a file
28.an internet transfer protocol used for reliable, sequential data transmission
29.set of people or devices that all share the same secret key
31.a computer mode operation where users are not all cleared for all data
32.a electronic signature that encrypts documents with digital codes
35.a level of web site availability in which no special steps ensure availability
38.identifies the domain's server
39.translates private addresses inside a site to a global Internet address
41.is the global address of documents and other resources on the World Wide Web

Use the "Printable HTML" button to get a clean page, in either HTML or PDF, that you can use your browser's print button to print. This page won't have buttons or ads, just your puzzle. The PDF format allows the web site to know how large a printer page is, and the fonts are scaled to fill the page. The PDF takes awhile to generate. Don't panic!




Google
 
Web armoredpenguin.com

Copyright information Privacy information Contact us