Subject:- Network and Information Security
Across
- 3. In this attack attacker does not modify the message contents
- 5. virus which affect micro soft word like document
- 6. It is hardware or software or combination of both,which will inspect network traffic passing through it and either accept or reject message based on a set of rules d
- 8. The term process of encoding plaintext to cipher text message is known as.....
- 9. coded message
- 10. original message
- 12. most destructive virus or worm
Down
- 1. It is used to prove the identity of the user
- 2. This attack prevent access to the target system and deny authorized users to specific information.
- 4. First phase of virus
- 7. who is legal user
- 11. plain text is "INFORMATION" what is cipher text solve using caeser's cipher