Network Security

Dr. S Nagaraja

Learn network security

1 2 3       4            
     
  5                        
      6
7                          
       
8                          
     
  9                
10                              
     
11                              
  12
13               14              
     
15   16  
  17                    
        18
19                        
    20            
21                  
       
  22                  
 
23                

Across
3.The property of withstanding failure
5.the property that two communicating agents or related resources cannot be correlated
7.Enabling access to data or resources
8.A weakness
9.What prevents 'bad' things from happening? a method for implementing a policy
10.the property that two actions from the same agent or over the same resource cannot be correlated
11.the property that actions of an agent (or over a resource) are wholly unknown; the strongest form of anonymity
13.You can't escape your past
17.acceptance of false data
19.interruption of correct operation
20.a means to prevent a vulnerability from being exploited
21.a delibrate attempt to exploit a vulnerability
22.keeping data or resources intact
23.the property of an agent or resource remaining nameless or attribute-less; about which nothing is known
Down
1.What vulnerabilities should the system designer defend against?
2.Keeping resources or data hidden
4.Property of being genuine
6.part of the module title
12.Who are you defending against?
14.unauthorised access to information
15.unauthorised control of a part or whole of the system
16.part of the module title
18.What's 'bad' and what's 'good'; a statement of what is and what isn't allowed