Cryptober Puzzle #3

123456789101112131415
Across
  1. 2. (Sometimes referred to as a perimeter network or screened subnet) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet.
  2. 3. a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities[1] and other bugs, with such patches usually being called bug fixes or bug fixes.
  3. 6. Developed by Phil Zimmermann. Used for signing, encrypting and decrypting texts, emails, files, directories, and whole disk partitions and to increase the security of email communications.
  4. 7. The concept that a person can mine or validate block transactions according to how many coins they hold.
  5. 9. Any data that could potentially be used to identify a particular person
  6. 10. How do you officially request support from IT
  7. 11. Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information.
  8. 14. The use of digital attacks to attack a nation, causing comparable harm to actual warfare and/or disrupting the vital computer systems.
  9. 15. an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
Down
  1. 1. stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
  2. 4. Term used to describe when one or more computers or networking devices attempt to send data at the same time to one computer, server, or other network devices.
  3. 5. the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organization.
  4. 8. random data that is used as an additional input to a one-way function that hashes data, a password, or passphrase.
  5. 12. a disk encryption program in macOS
  6. 13. a cryptographical concept where the encryption keys are held in trust by a third party to be turned over to the grantee only upon fulfillment of a condition.