CLIL Module Exercise (Line C)
Across
- 5. Kind of attacks performed to discover and map system vulnerabilities
- 7. Something that has no sense
- 9. The key used by the sender in order to ensure authentication
- 10. When the DoS attack is not coming from a single host
Down
- 1. Bits added to get blocks of the same length
- 2. Attack name performed when attacker sends multiple SYN requests to a server
- 3. Traditional signature
- 4. Message length with a variable number of bits
- 6. Set of steps to follow to modify the message according to the rules defined
- 8. property that occurs when flipping one single bit half of the output bits flip