NS

12345678910111213141516
Across
  1. 2. is the first computer virus identified
  2. 5. is not a strong security protocol.
  3. 7. Lack of access control policy falls under
  4. 8. text is transformed using cipher algorithms
  5. 9. is not considered in the triad according to the CIA.
  6. 10. What is the CIA triad also known as?
  7. 13. do not replicate or clone through infection
  8. 14. Compromising confidential information falls under
  9. 16. is the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
Down
  1. 1. is the process of verifying the identity of a user
  2. 3. text The information that gets transformed in encryption process
  3. 4. hacking is a legal form of hacking
  4. 6. server is used to hide malicious activity on the network
  5. 8. is the oldest phone hacking technique used by hackers to make free calls
  6. 10. is used to help users detect viruses and avoid them
  7. 11. scan is an incorrect type of scanning.
  8. 12. attack refers to the denial of service attack.
  9. 15. The term which denotes that only authorized users are capable of accessing the information