CPSC 4240 Security
Across
- 4. An authentication system designed at MIT that uses tickets to validate identities
- 6. Malicious code designed to remain undetected while providing an attacker high-level access
- 7. Method of hiding data in another file type (like images) to conceal its existence
- 9. A random string added to passwords before hashing to prevent rainbow table attacks
- 10. A social engineering attack using fraudulent emails or communications to steal credentials
- 12. A command that allows users to run programs as another user, usually root
- 15. A Turing test used to tell humans and computers apart
- 16. A physical security breach where an unauthorized person follows an authorized person through a door
- 18. A in CIA triad
- 20. I in CIA triad
Down
- 1. Cyber attack that destroyed Iranian uranium centrifuges
- 2. The process of securing a system by reducing its attack surface
- 3. C in CIA triad
- 5. Authentication based on physical characteristics like fingerprints
- 8. A type of cryptography, also known as public-key, that uses a key pair
- 9. The default standard for remote logging and aggregation
- 11. In stenography, the specific information that needs to be concealed
- 13. A trap set to detect or deflect attackers
- 14. The standard tool used for packet filtering and firewall rules on Linux
- 15. Occurs when two different inputs to a hashing function generate the same output value
- 17. A network of compromised devices used for DDoS attacks
- 19. A type of malware that self-replicates