NS
Across
- 2. is the first computer virus identified
- 5. is not a strong security protocol.
- 7. Lack of access control policy falls under
- 8. text is transformed using cipher algorithms
- 9. is not considered in the triad according to the CIA.
- 10. What is the CIA triad also known as?
- 13. do not replicate or clone through infection
- 14. Compromising confidential information falls under
- 16. is the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
Down
- 1. is the process of verifying the identity of a user
- 3. text The information that gets transformed in encryption process
- 4. hacking is a legal form of hacking
- 6. server is used to hide malicious activity on the network
- 8. is the oldest phone hacking technique used by hackers to make free calls
- 10. is used to help users detect viruses and avoid them
- 11. scan is an incorrect type of scanning.
- 12. attack refers to the denial of service attack.
- 15. The term which denotes that only authorized users are capable of accessing the information