Linux Crossword Puzzle
Across
- 1. denial of service attack that overwhelms a network with requests
- 5. form of authentication that uses biological forms of identification
- 6. selection of people with the same permissions
- 7. the process of verifying identity
- 10. converting data into unreadable text using a key and an algorithm
- 13. layer of security that scrutinizes network traffic
- 14. command to run privileged commands, requires a password.
- 15. one half of an encryption method that uses two keys this key is only used by you
- 16. a form of security that uses a second private check to verify you (app, code, etc)
- 18. log file that contains system info as well as login attempts
- 20. malicious program designed to damage or steals data
- 21. config file for sudo permissions
Down
- 2. form of encryption that uses the same key
- 3. hiding data in another media type
- 4. command to safely edit the suodoers file
- 8. config file that allows you to set limits
- 9. file that stores password hashes and is restricted to root access.
- 11. the highest level of privilege on linux
- 12. one half of an encryption method that uses two keys this key is used by outside sources
- 17. command used to change permission of a file
- 19. the command to change a password