CPSC 4240 - Linux Security

123456789101112131415161718192021222324
Across
  1. 2. front-facing software vulnerable to malicious actors
  2. 4. hiding data in a large media file
  3. 6. system in which data is written to a file instead of being written directly to the file system to minimize the chance of file corruption
  4. 11. a software update meant to fix security issues
  5. 13. value used in hashing to reduce collisions
  6. 14. data about file data
  7. 15. malware that affected an Iranian nuclear power facility in 2010
  8. 17. a large kernel that runs all its modules in kernel space
  9. 19. a user with elevated privileges within the system
  10. 21. one of the greatest and most unpredictable treats to a network system
  11. 23. essential to have in case of system failure, damage, sabotage, etc.
  12. 24. defense in _____: having multiple layers of security
Down
  1. 1. command to safely detach an external file system
  2. 3. automated test used to verify human users and detect bots
  3. 5. security measure meant to filter network traffic
  4. 7. security that is inconspicuous
  5. 8. using an algorithm and key to hide data from outside parties
  6. 9. authentication methods such as fingerprints, iris scans, and face recognition
  7. 10. command used to safely edit the etc/sudoers file
  8. 12. file containing usernames and hashes of their passwords
  9. 16. devices that can be attached or removed without rebooting the system
  10. 18. not telling malicious actors what kinds of security measures are in place
  11. 20. value used to determine the permissions of a newly-created file or directory
  12. 22. data structure that contains information about a file or directory, including the location of its contents