4240 Security Crossword Nathan Kitchens

12345678910111213141516171819202122232425
Across
  1. 3. engineering exploiting humans as weakest link
  2. 6. protocol used to secure network communication
  3. 9. protection of data from unauthorized access
  4. 12. authentication system using tickets
  5. 14. tool for email encryption and signatures
  6. 16. secure tunnel over a network
  7. 17. triad confidentiality integrity and availability model
  8. 18. networks of compromised devices used in attacks
  9. 19. secure remote login protocol
  10. 20. attack aimed at disrupting services
  11. 22. updates that fix vulnerabilities
  12. 23. ensuring access for authorized users
  13. 24. function used to verify data integrity
  14. 25. system used for logging events
Down
  1. 1. malicious tools that hide on systems
  2. 2. system that filters network traffic
  3. 4. privilege principle limiting access rights
  4. 5. copies of data stored for recovery
  5. 7. hiding data within other media
  6. 8. surface total exposed points of vulnerability
  7. 10. linux implementation of ssh
  8. 11. ensuring authenticity and accuracy of information
  9. 13. process of securing data
  10. 15. attack using fake messages to steal information
  11. 21. secure hash algorithm example