Code Crackers

12345678910111213141516
Across
  1. 4. protocol to lookup user information on a given host
  2. 5. Finite set of step-by-step instructions for a problem-solving that can be implemented by a computer.
  3. 6. the process of detecting and defeating the use of steganography.
  4. 9. tool that monitors network traffic as it received in a network interface.
  5. 11. essential center of a computer operating system
  6. 12. use physical characteristics of the users to determine access.
  7. 13. network point that acts as an entrance to another network.
  8. 14. Internet file sharing utility.
  9. 15. use of special regression testing tools to generate out-of-spec input for an application
  10. 16. large number of compromised computers that are used to create and send spam or viruses
Down
  1. 1. tool installed after a compromise to give an attacker easier access
  2. 2. networking device that keeps track of MAC addresses attached to each of its ports
  3. 3. term for the interactive user interface with an operating system
  4. 5. the process of confirming the correctness of the claimed identity
  5. 7. Searching through data residue in a system to gain unauthorized knowledge
  6. 8. fundamental unit of computer storage;
  7. 10. A cryptographic algorithm for encryption and decryption.