Cryptic Hunt Set - 3

1234567891011121314151617181920
Across
  1. 5. A technique used in file systems to improve performance by delaying the writing of data to disk until it is necessary.
  2. 7. In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
  3. 11. What cryptographic protocol secures email communication by providing authentication and encryption?
  4. 12. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
  5. 14. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
  6. 16. Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
  7. 17. What type of attack targets the domain name system (DNS) to redirect users to malicious websites?
  8. 19. A tool used to automatically generate code from a given set of rules or templates.
  9. 20. Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
Down
  1. 1. A technique used in operating systems to protect critical sections of code by allowing only one thread to execute them at a time.
  2. 2. A technique used in file systems to ensure data integrity by recording changes to disk structures before making them.
  3. 3. What security measure restricts access to a network based on the physical address of a device?
  4. 4. A class that allows multiple threads to read from or write to a shared resource without interference.
  5. 6. What type of attack floods a network with excessive traffic to overwhelm its capacity?
  6. 8. A feature introduced in Java 8 that allows for the concise representation of anonymous functions or methods as instances of functional interfaces.
  7. 9. What is the name of the method for generating round keys from the original cryptographic key?
  8. 10. In the Vigenère cipher, what is the key used for encrypting the message?
  9. 13. A tool used for continuous integration and continuous delivery in Java projects.
  10. 15. A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
  11. 18. What is the name of the mathematical process used to reverse encryption?