iSeries/i5 security: Crossword puzzle

Try to solve our i5 security crossword puzzle.

Are your crossword skills as dependable as i5/iSeries security is? Test your i5 security knowledge!

Please note: This puzzle is NOT interactive...you cannot solve it on this page. Please print it out, and complete it the old fashion way -- with a pencil.

ACROSS

6. The theft of information from a wireless device through a Bluetooth connection. Answer

10. A hacker with malicious intent. Answer

12. A set of protocols to support secure exchange of packets at the network layer. Answer

14. The attackers masquerade as a trusted system to try to persuade you to send secret information to them. Answer

15. An e-mail fraud. Answer

17. An extension of an enterprise's private intranet. Answer

18. The illegal copying, distribution, or use of software. Answer

19. A unit of information that is sent across a TCP/IP network. Answer

DOWN

1. A private business network of several cooperating organizations located outside the corporate firewall. Answer

2. An unspaced sequence of characters used to determine that a computer user is a particular user. Answer

3. The practice of monitoring or eavesdropping on electronic transmissions. Answer

4. A program or file that is harmful to a computer user. Answer

5. Any unauthorized person who tries to break into your system. Answer

Click here to view the iSeries/i5 security crossword puzzle.

This was last published in May 2006

Dig Deeper on iSeries system and application security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchEnterpriseLinux

SearchDataCenter

Close