Network and Information Security

123456789101112131415
Across
  1. 4. Hiding data inside image/audio
  2. 6. Uses public and private keys
  3. 7. Access control decided by system rules
  4. 9. Cloud model offering software as service
  5. 12. Attack that inserts malicious SQL queries
  6. 14. Attackthat monitors data without altering it
  7. 15. Original readable message
Down
  1. 1. Verification of user identity
  2. 2. Malware that locks data and demands payment
  3. 3. Ticket-based authentication protocol
  4. 5. Password attack using trash data
  5. 8. Caesar cipher is a type of this technique
  6. 10. Relationship between threat, vulnerability, and damage
  7. 11. Decoy system to trap attackers
  8. 13. System that detects intrusions