Linux Security
Across
- 2. Following an authorized person through a secure door.
- 3. File where changing a UID to 0 creates a backdoor.
- 4. Packet filtering firewall on Linux.
- 8. Ticket-based authentication system from MIT.
- 13. Secure remote login protocol on port 22.
- 14. Command used to age passwords.
- 15. Hiding a secret message inside an image file.
- 16. Weak hash algorithm that is vulnerable to collisions.
- 17. Malware that hides by replacing commands like ls.
- 19. Employee who is a security threat.
- 20. Triad of Confidentiality, Integrity, and Accessibility.
- 22. When two different inputs make the exact same hash value.
Down
- 1. Default logging service in Linux.
- 3. Famous 2010 malicious worm discussed in class.
- 5. Phil Zimmerman's email security tool.
- 6. Encryption using a public and private key pair.
- 7. Pseudo-device driver used to generate random numbers.
- 9. Group famous for penetration testing methods.
- 10. Battery device that provides backup power.
- 11. The modern successor to the SSL protocol.
- 12. Test to tell computers and humans apart.
- 13. Encryption using the same key for sender and receiver.
- 18. Tool used to monitor file integrity.
- 21. Attack that disrupts service using botnets.