Linux Security

12345678910111213141516171819202122
Across
  1. 2. Following an authorized person through a secure door.
  2. 3. File where changing a UID to 0 creates a backdoor.
  3. 4. Packet filtering firewall on Linux.
  4. 8. Ticket-based authentication system from MIT.
  5. 13. Secure remote login protocol on port 22.
  6. 14. Command used to age passwords.
  7. 15. Hiding a secret message inside an image file.
  8. 16. Weak hash algorithm that is vulnerable to collisions.
  9. 17. Malware that hides by replacing commands like ls.
  10. 19. Employee who is a security threat.
  11. 20. Triad of Confidentiality, Integrity, and Accessibility.
  12. 22. When two different inputs make the exact same hash value.
Down
  1. 1. Default logging service in Linux.
  2. 3. Famous 2010 malicious worm discussed in class.
  3. 5. Phil Zimmerman's email security tool.
  4. 6. Encryption using a public and private key pair.
  5. 7. Pseudo-device driver used to generate random numbers.
  6. 9. Group famous for penetration testing methods.
  7. 10. Battery device that provides backup power.
  8. 11. The modern successor to the SSL protocol.
  9. 12. Test to tell computers and humans apart.
  10. 13. Encryption using the same key for sender and receiver.
  11. 18. Tool used to monitor file integrity.
  12. 21. Attack that disrupts service using botnets.