Subject:- Network and Information Security

123456789101112
Across
  1. 3. In this attack attacker does not modify the message contents
  2. 5. virus which affect micro soft word like document
  3. 6. It is hardware or software or combination of both,which will inspect network traffic passing through it and either accept or reject message based on a set of rules d
  4. 8. The term process of encoding plaintext to cipher text message is known as.....
  5. 9. coded message
  6. 10. original message
  7. 12. most destructive virus or worm
Down
  1. 1. It is used to prove the identity of the user
  2. 2. This attack prevent access to the target system and deny authorized users to specific information.
  3. 4. First phase of virus
  4. 7. who is legal user
  5. 11. plain text is "INFORMATION" what is cipher text solve using caeser's cipher