Security - Hard

1234567891011
Across
  1. 2. practice of intentionally and ethically hacking into systems to discover vulnerabilities
  2. 3. cryptographic protocol providing secure key exchange over an untrusted network, often used in VPNs
  3. 5. security model emphasizing the importance of confidentiality, integrity, and availability of information
  4. 7. type of attack involves capturing and analyzing network traffic to obtain sensitive information
  5. 9. attack that employs multiple methods simultaneously
  6. 11. type of malware changes its appearance and characteristics to evade detection
Down
  1. 1. process of hiding information within another file or message
  2. 4. cybersecurity principle ensuring that data is accurate, complete, and unaltered
  3. 6. practice of disguising data traffic to make it look like normal traffic
  4. 7. Linux user's favorite game
  5. 8. cryptographic process verifying the integrity of data and ensures it has not been altered during transmission
  6. 10. type of malware disguises itself as legitimate software to trick users into installing it