Across
- 3. engineering exploiting humans as weakest link
- 6. protocol used to secure network communication
- 9. protection of data from unauthorized access
- 12. authentication system using tickets
- 14. tool for email encryption and signatures
- 16. secure tunnel over a network
- 17. triad confidentiality integrity and availability model
- 18. networks of compromised devices used in attacks
- 19. secure remote login protocol
- 20. attack aimed at disrupting services
- 22. updates that fix vulnerabilities
- 23. ensuring access for authorized users
- 24. function used to verify data integrity
- 25. system used for logging events
Down
- 1. malicious tools that hide on systems
- 2. system that filters network traffic
- 4. privilege principle limiting access rights
- 5. copies of data stored for recovery
- 7. hiding data within other media
- 8. surface total exposed points of vulnerability
- 10. linux implementation of ssh
- 11. ensuring authenticity and accuracy of information
- 13. process of securing data
- 15. attack using fake messages to steal information
- 21. secure hash algorithm example
