Code Crackers
Across
- 4. protocol to lookup user information on a given host
- 5. Finite set of step-by-step instructions for a problem-solving that can be implemented by a computer.
- 6. the process of detecting and defeating the use of steganography.
- 9. tool that monitors network traffic as it received in a network interface.
- 11. essential center of a computer operating system
- 12. use physical characteristics of the users to determine access.
- 13. network point that acts as an entrance to another network.
- 14. Internet file sharing utility.
- 15. use of special regression testing tools to generate out-of-spec input for an application
- 16. large number of compromised computers that are used to create and send spam or viruses
Down
- 1. tool installed after a compromise to give an attacker easier access
- 2. networking device that keeps track of MAC addresses attached to each of its ports
- 3. term for the interactive user interface with an operating system
- 5. the process of confirming the correctness of the claimed identity
- 7. Searching through data residue in a system to gain unauthorized knowledge
- 8. fundamental unit of computer storage;
- 10. A cryptographic algorithm for encryption and decryption.