CPSC 4240 Crossword

12345678910111213141516171819202122
Across
  1. 2. a hardware device that provides emergency power and allows systems to shut down gracefully during failures
  2. 5. an authentication system developed a MIT that uses "tickets" to guarantee identities
  3. 8. the method of hiding data within another medium, like an image or audio file, to conceal its existence
  4. 9. a cryptographic failure where two different inputs generate the same hash output
  5. 13. a security system that requires multiple forms of identification factors to gain access to an account
  6. 14. a network of compromised computers, often including IoT devices, infected with malware
  7. 17. the systematic process of securing a Linux system by reducing its attack surface by disabling unnecessary services
  8. 20. a process that generates a fixed-length string of characters from a variable-length input
  9. 21. malicious software that provides unauthorized administrative-level access to a computer while remaining undetected.
  10. 22. public-key cryptography that utilizes a shared public key and a secret private key to guarantee the identities of users and services
Down
  1. 1. a command-line firewall utility that acts as a packet filtering system.
  2. 3. the file or medium used in steganography to hold a hidden payload
  3. 4. a cyberattack where scammers impersonate organization or individuals to steal sensitive information
  4. 6. a malicious computer worm that targeted Iran's nuclear program in 2010
  5. 7. a public turing test used to verify that a web user is a human rather than a spambot
  6. 10. a type of encryption that utilizes a singular shared key for both encryption and decryption
  7. 11. in steganography, this refers to information that has to be concealed and transmitted
  8. 12. the Linux command used to manage password expiration and aging
  9. 15. a cryptographic network protocol used for secure remote login and command execution
  10. 16. a network-level security system that prevents unwanted packets from accessing network and systems
  11. 18. a security measure that uses unique physical traits, such as fingerprints or retinas, for authentication
  12. 19. a cryptographic method used for securing email through encryption and digital signatures