Cybersecurity Vocab Words

12345
Across
  1. 2. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or after data traveling between them
  2. 3. an attack that exploits mathematical in encryption algorithms
  3. 4. is an attack model for cryptanalysis where the attacker has access to both the plaintext
  4. 5. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
Down
  1. 1. is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme