Network Security-1
Across
- 3. text is transformed using cipher algorithms
- 5. is the first computer virus identified
- 7. The term which denotes that only authorized users are capable of accessing the information
- 8. is the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
- 9. attack refers to the denial of service attack.
Down
- 1. What is the CIA triad also known as?
- 2. Compromising confidential information falls under
- 3. server is used to hide malicious activity on the network
- 4. is used to help users detect viruses and avoid them
- 6. text The information that gets transformed in encryption process