Intro to Cybersecurity CA #2

1234567891011
Across
  1. 3. Linux command used to search a file for keywords
  2. 5. Base 16 system
  3. 6. Changing the order of items
  4. 10. Brain of the computer; determines what software can run on device
  5. 11. Encryption method; pre-shared password is only used once
Down
  1. 1. Subsitution cipher based on multiple alphabets using system to switch between
  2. 2. Precise set of instructions on how to scramble/unscramble data
  3. 4. Hiding messages in an image
  4. 7. Displays absolute path of directory
  5. 8. Sends message to destination device
  6. 9. group of 2 or more computing devices connected to each other, giving access to the same data