Linux Crossword Puzzle

123456789101112131415161718192021
Across
  1. 1. denial of service attack that overwhelms a network with requests
  2. 5. form of authentication that uses biological forms of identification
  3. 6. selection of people with the same permissions
  4. 7. the process of verifying identity
  5. 10. converting data into unreadable text using a key and an algorithm
  6. 13. layer of security that scrutinizes network traffic
  7. 14. command to run privileged commands, requires a password.
  8. 15. one half of an encryption method that uses two keys this key is only used by you
  9. 16. a form of security that uses a second private check to verify you (app, code, etc)
  10. 18. log file that contains system info as well as login attempts
  11. 20. malicious program designed to damage or steals data
  12. 21. config file for sudo permissions
Down
  1. 2. form of encryption that uses the same key
  2. 3. hiding data in another media type
  3. 4. command to safely edit the suodoers file
  4. 8. config file that allows you to set limits
  5. 9. file that stores password hashes and is restricted to root access.
  6. 11. the highest level of privilege on linux
  7. 12. one half of an encryption method that uses two keys this key is used by outside sources
  8. 17. command used to change permission of a file
  9. 19. the command to change a password