CSE 167
Across
- 3. copies of data that can be used to replace the original
- 5. is a method of gaining unauthorized access to a network or computer system
- 9. The use of multiple layers of security techniques to help rescue the chance of successful attacks
- 10. in computer security is an exercises in which "flags" are security hidden in purposefully-vulnerable programs or websites
Down
- 1. allows you to encrypt and sign your data and communications
- 2. An attack that tricks people in believing they are someone else
- 4. Confidentiality,Integrity,Availability
- 6. Study of techniques for secure communication in the presenter of third parties
- 7. Someone that doesn't work directly under an organization but provides advice regarding cybersecurity measures for client organizations
- 8. attack that involves trying all possible private keys