Luke Nick and Harry
Across
- 6. The original form of a message
- 7. The receptiveness and convenience of data
- 8. A process of encryption named after a Roman Emperor
- 10. A measure put in place to minimize threats
- 11. Software that takes advantage of a flaw
- 13. Fraudulent practice of getting personal information
- 15. Files that have changed since last backup
- 16. Preliminary experimentation on a system
Down
- 1. Identifying and analyzing flaws
- 2. Encryption that uses the same key
- 3. Exposed to the possibility of an attack
- 4. Magic happens after this process of plaintext
- 5. Guessing all combinations until correct
- 9. Restoring data
- 12. A digital authentication of dependability: can verify authenticity.
- 14. Simulating a potential cyber-barrage