CPSC 4240 Security

1234567891011121314151617181920
Across
  1. 4. An authentication system designed at MIT that uses tickets to validate identities
  2. 6. Malicious code designed to remain undetected while providing an attacker high-level access
  3. 7. Method of hiding data in another file type (like images) to conceal its existence
  4. 9. A random string added to passwords before hashing to prevent rainbow table attacks
  5. 10. A social engineering attack using fraudulent emails or communications to steal credentials
  6. 12. A command that allows users to run programs as another user, usually root
  7. 15. A Turing test used to tell humans and computers apart
  8. 16. A physical security breach where an unauthorized person follows an authorized person through a door
  9. 18. A in CIA triad
  10. 20. I in CIA triad
Down
  1. 1. Cyber attack that destroyed Iranian uranium centrifuges
  2. 2. The process of securing a system by reducing its attack surface
  3. 3. C in CIA triad
  4. 5. Authentication based on physical characteristics like fingerprints
  5. 8. A type of cryptography, also known as public-key, that uses a key pair
  6. 9. The default standard for remote logging and aggregation
  7. 11. In stenography, the specific information that needs to be concealed
  8. 13. A trap set to detect or deflect attackers
  9. 14. The standard tool used for packet filtering and firewall rules on Linux
  10. 15. Occurs when two different inputs to a hashing function generate the same output value
  11. 17. A network of compromised devices used for DDoS attacks
  12. 19. A type of malware that self-replicates