Cybersecurity
Across
- 1. A computer attack aimed at making a service unavailable.
- 4. A program/device that protects a network.
- 6. A type of malware that looks like a legimate program and is undetected by the anti-virus
- 7. A network of computers infected by malware that are under the control of a single attacking party.
- 9. A technique for protecting data by transforming it irreversibly.
Down
- 2. A technique of symmetric encryption.
- 3. A hashing algorithm which is the most used in secret-keys transfert.
- 5. A known certfication authority who offers free certificates.
- 8. A brand that makes cybersecurity devices especially for companies.
- 10. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.